f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x441, @ipv4={'\x00', '\xff\xff', @remote}, 0x80}, r2}}, 0x30) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0xe0, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x39, 0x10}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x20}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'geneve1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x64010100}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) 15:08:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:08:57 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x777600, 0x0) 15:08:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private0}, r1}}, 0x30) 15:08:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000000)={{0x7fff, 0x9}, {0x8}, 0x6}) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {r1, 0x5c9a, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @broadcast}, @ib={0x1b, 0x3ff, 0x1000, {"379b9495d25002360efc74fd369b694a"}, 0xed21, 0xa6, 0x101}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:08:57 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x777600, 0x0) 15:08:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x441, @ipv4={'\x00', '\xff\xff', @remote}, 0x80}, r2}}, 0x30) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0xe0, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x39, 0x10}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x20}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'geneve1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x64010100}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x111, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x441, @ipv4={'\x00', '\xff\xff', @remote}, 0x80}, r2}}, 0x30) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0xe0, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x39, 0x10}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x20}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'geneve1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x64010100}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) (async) 15:08:57 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) (async) r2 = getuid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x90, 0xffffffffffffffda, r1, {0x4, 0x1, 0x3, 0xd3d, 0x5, 0xfffffffc, {0x6, 0x5, 0xfffffffffffff103, 0x2, 0x3, 0x8001, 0xff, 0x8, 0x3f, 0x4000, 0x1, r2, 0xffffffffffffffff, 0x10, 0x6}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) 15:08:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private0}}}, 0x30) 15:08:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:08:57 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0xc7bc5641d458b9d6, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000080)) 15:08:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000000)={{0x7fff, 0x9}, {0x8}, 0x6}) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {r1, 0x5c9a, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @broadcast}, @ib={0x1b, 0x3ff, 0x1000, {"379b9495d25002360efc74fd369b694a"}, 0xed21, 0xa6, 0x101}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:08:57 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0xc7bc5641d458b9d6, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000080)) 15:08:57 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0xc7bc5641d458b9d6, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000080)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0xc7bc5641d458b9d6, 0x0) (async) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000080)) (async) 15:08:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private0}}}, 0x30) 15:08:57 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000000)={{0x7fff, 0x9}, {0x8}, 0x6}) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {r1, 0x5c9a, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @broadcast}, @ib={0x1b, 0x3ff, 0x1000, {"379b9495d25002360efc74fd369b694a"}, 0xed21, 0xa6, 0x101}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:08:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0xffffffffffffffd1, 0xfa00, {&(0x7f0000000140), 0x4, {0xa, 0x4ea0, 0x80000000, @private1, 0x31}, r5}}, 0x38) 15:08:57 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0x4, 0x1, 0xea}) 15:08:57 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) r2 = getuid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x90, 0xffffffffffffffda, r1, {0x4, 0x1, 0x3, 0xd3d, 0x5, 0xfffffffc, {0x6, 0x5, 0xfffffffffffff103, 0x2, 0x3, 0x8001, 0xff, 0x8, 0x3f, 0x4000, 0x1, r2, 0xffffffffffffffff, 0x10, 0x6}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000380)={0x2020}, 0x2020) (async) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) (async) getuid() (async) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x90, 0xffffffffffffffda, r1, {0x4, 0x1, 0x3, 0xd3d, 0x5, 0xfffffffc, {0x6, 0x5, 0xfffffffffffff103, 0x2, 0x3, 0x8001, 0xff, 0x8, 0x3f, 0x4000, 0x1, r2, 0xffffffffffffffff, 0x10, 0x6}}}, 0x90) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async) 15:08:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private0}}}, 0x30) 15:08:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:08:58 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0x4, 0x1, 0xea}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x0) (async) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0x4, 0x1, 0xea}) (async) 15:08:58 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000400)={'erspan0\x00', 0x0, 0x7, 0x7, 0x4, 0xcc, {{0x21, 0x4, 0x3, 0x1, 0x84, 0x68, 0x0, 0x8d, 0x0, 0x0, @loopback, @private=0xa010102, {[@generic={0x86, 0x5, "aec25c"}, @rr={0x7, 0x17, 0x55, [@private=0xa010102, @private=0xa010101, @local, @private=0xa010102, @loopback]}, @ssrr={0x89, 0x7, 0xe, [@private=0xa010102]}, @timestamp={0x44, 0x14, 0x61, 0x0, 0xe, [0x9ddd, 0x81, 0x5, 0x1ff]}, @ssrr={0x89, 0x23, 0x42, [@dev={0xac, 0x14, 0x14, 0x11}, @rand_addr=0x64010102, @rand_addr=0x64010102, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast, @dev={0xac, 0x14, 0x14, 0x34}]}, @lsrr={0x83, 0xf, 0x7c, [@multicast1, @remote, @multicast2]}, @generic={0x82, 0x6, "e3ef1112"}]}}}}}) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_ext={0x1c, 0xd, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x5}, [@exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x7}, @jmp={0x5, 0x1, 0xd, 0xa, 0x7, 0x30, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000600)='GPL\x00', 0x7, 0x35, &(0x7f0000000640)=""/53, 0x41100, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x4, 0x0, 0x7}, 0x10, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x10, 0x81, 0x4, 0xfffffc4f, 0x10, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x2, 0x6, 0x2, 0x6, 0x30, 0x1}], &(0x7f0000000300)='GPL\x00', 0x0, 0x89, &(0x7f0000000340)=""/137, 0x41100, 0x10, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xd, 0x6, 0x1}, 0x10, 0x1f5e7, r1, 0x0, &(0x7f0000000840)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2, 0x1]}, 0x80) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x7, 0x3, "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", 0xe3, 0x1e, 0xff, 0x1, 0x7, 0x86, 0x2, 0x1}, r4}}, 0x120) 15:08:58 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0x4, 0x1, 0xea}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) ioctl$PTP_ENABLE_PPS(0xffffffffffffffff, 0x40043d04, 0x0) (async) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0x4, 0x1, 0xea}) (async) 15:08:58 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x448000, 0x0) 15:08:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0xffffffffffffffd1, 0xfa00, {&(0x7f0000000140), 0x4, {0xa, 0x4ea0, 0x80000000, @private1, 0x31}, r5}}, 0x38) 15:08:58 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x448000, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x448000, 0x0) (async) 15:08:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x80000, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0xc715}}, 0x10) 15:08:58 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x448000, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x448000, 0x0) (async) 15:08:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x8, 0x5, "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", 0x95, 0x80, 0x8, 0x3, 0x3f, 0x5}, r5}}, 0x128) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:08:58 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, r1}, 0x10) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000004140)={0x90, 0x0, r1, {0x4, 0x0, 0x5, 0x100000001, 0xbd8c, 0x3, {0x5, 0x599, 0x0, 0x4, 0x2, 0x69e6, 0x3f, 0xffffffe5, 0x490e, 0xb000, 0x1, r3, r2, 0x7, 0x36}}}, 0x90) 15:08:58 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000400)={'erspan0\x00', 0x0, 0x7, 0x7, 0x4, 0xcc, {{0x21, 0x4, 0x3, 0x1, 0x84, 0x68, 0x0, 0x8d, 0x0, 0x0, @loopback, @private=0xa010102, {[@generic={0x86, 0x5, "aec25c"}, @rr={0x7, 0x17, 0x55, [@private=0xa010102, @private=0xa010101, @local, @private=0xa010102, @loopback]}, @ssrr={0x89, 0x7, 0xe, [@private=0xa010102]}, @timestamp={0x44, 0x14, 0x61, 0x0, 0xe, [0x9ddd, 0x81, 0x5, 0x1ff]}, @ssrr={0x89, 0x23, 0x42, [@dev={0xac, 0x14, 0x14, 0x11}, @rand_addr=0x64010102, @rand_addr=0x64010102, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast, @dev={0xac, 0x14, 0x14, 0x34}]}, @lsrr={0x83, 0xf, 0x7c, [@multicast1, @remote, @multicast2]}, @generic={0x82, 0x6, "e3ef1112"}]}}}}}) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_ext={0x1c, 0xd, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x5}, [@exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x7}, @jmp={0x5, 0x1, 0xd, 0xa, 0x7, 0x30, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000600)='GPL\x00', 0x7, 0x35, &(0x7f0000000640)=""/53, 0x41100, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x4, 0x0, 0x7}, 0x10, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x10, 0x81, 0x4, 0xfffffc4f, 0x10, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x2, 0x6, 0x2, 0x6, 0x30, 0x1}], &(0x7f0000000300)='GPL\x00', 0x0, 0x89, &(0x7f0000000340)=""/137, 0x41100, 0x10, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xd, 0x6, 0x1}, 0x10, 0x1f5e7, r1, 0x0, &(0x7f0000000840)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2, 0x1]}, 0x80) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x7, 0x3, "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", 0xe3, 0x1e, 0xff, 0x1, 0x7, 0x86, 0x2, 0x1}, r4}}, 0x120) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000400)={'erspan0\x00', 0x0, 0x7, 0x7, 0x4, 0xcc, {{0x21, 0x4, 0x3, 0x1, 0x84, 0x68, 0x0, 0x8d, 0x0, 0x0, @loopback, @private=0xa010102, {[@generic={0x86, 0x5, "aec25c"}, @rr={0x7, 0x17, 0x55, [@private=0xa010102, @private=0xa010101, @local, @private=0xa010102, @loopback]}, @ssrr={0x89, 0x7, 0xe, [@private=0xa010102]}, @timestamp={0x44, 0x14, 0x61, 0x0, 0xe, [0x9ddd, 0x81, 0x5, 0x1ff]}, @ssrr={0x89, 0x23, 0x42, [@dev={0xac, 0x14, 0x14, 0x11}, @rand_addr=0x64010102, @rand_addr=0x64010102, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast, @dev={0xac, 0x14, 0x14, 0x34}]}, @lsrr={0x83, 0xf, 0x7c, [@multicast1, @remote, @multicast2]}, @generic={0x82, 0x6, "e3ef1112"}]}}}}}) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_ext={0x1c, 0xd, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x5}, [@exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x7}, @jmp={0x5, 0x1, 0xd, 0xa, 0x7, 0x30, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000600)='GPL\x00', 0x7, 0x35, &(0x7f0000000640)=""/53, 0x41100, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x4, 0x0, 0x7}, 0x10, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x10, 0x81, 0x4, 0xfffffc4f, 0x10, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x2, 0x6, 0x2, 0x6, 0x30, 0x1}], &(0x7f0000000300)='GPL\x00', 0x0, 0x89, &(0x7f0000000340)=""/137, 0x41100, 0x10, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xd, 0x6, 0x1}, 0x10, 0x1f5e7, r1, 0x0, &(0x7f0000000840)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2, 0x1]}, 0x80) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x7, 0x3, "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", 0xe3, 0x1e, 0xff, 0x1, 0x7, 0x86, 0x2, 0x1}, r4}}, 0x120) (async) 15:08:58 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, r1}, 0x10) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) read$FUSE(r0, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000004140)={0x90, 0x0, r1, {0x4, 0x0, 0x5, 0x100000001, 0xbd8c, 0x3, {0x5, 0x599, 0x0, 0x4, 0x2, 0x69e6, 0x3f, 0xffffffe5, 0x490e, 0xb000, 0x1, r3, r2, 0x7, 0x36}}}, 0x90) 15:08:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0xffffffffffffffd1, 0xfa00, {&(0x7f0000000140), 0x4, {0xa, 0x4ea0, 0x80000000, @private1, 0x31}, r5}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x111, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0xffffffffffffffd1, 0xfa00, {&(0x7f0000000140), 0x4, {0xa, 0x4ea0, 0x80000000, @private1, 0x31}, r5}}, 0x38) (async) 15:08:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x80000, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0xc715}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x80000, &(0x7f0000000240), 0x106, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0xc715}}, 0x10) (async) 15:08:58 executing program 3: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000400)={'erspan0\x00', 0x0, 0x7, 0x7, 0x4, 0xcc, {{0x21, 0x4, 0x3, 0x1, 0x84, 0x68, 0x0, 0x8d, 0x0, 0x0, @loopback, @private=0xa010102, {[@generic={0x86, 0x5, "aec25c"}, @rr={0x7, 0x17, 0x55, [@private=0xa010102, @private=0xa010101, @local, @private=0xa010102, @loopback]}, @ssrr={0x89, 0x7, 0xe, [@private=0xa010102]}, @timestamp={0x44, 0x14, 0x61, 0x0, 0xe, [0x9ddd, 0x81, 0x5, 0x1ff]}, @ssrr={0x89, 0x23, 0x42, [@dev={0xac, 0x14, 0x14, 0x11}, @rand_addr=0x64010102, @rand_addr=0x64010102, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast, @dev={0xac, 0x14, 0x14, 0x34}]}, @lsrr={0x83, 0xf, 0x7c, [@multicast1, @remote, @multicast2]}, @generic={0x82, 0x6, "e3ef1112"}]}}}}}) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_ext={0x1c, 0xd, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x5}, [@exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x7}, @jmp={0x5, 0x1, 0xd, 0xa, 0x7, 0x30, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000600)='GPL\x00', 0x7, 0x35, &(0x7f0000000640)=""/53, 0x41100, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0x4, 0x0, 0x7}, 0x10, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1]}, 0x80) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x10, 0x81, 0x4, 0xfffffc4f, 0x10, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x2, 0x6, 0x2, 0x6, 0x30, 0x1}], &(0x7f0000000300)='GPL\x00', 0x0, 0x89, &(0x7f0000000340)=""/137, 0x41100, 0x10, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0xd, 0x6, 0x1}, 0x10, 0x1f5e7, r1, 0x0, &(0x7f0000000840)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, r2, 0x1]}, 0x80) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r5, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x7, 0x3, "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", 0xe3, 0x1e, 0xff, 0x1, 0x7, 0x86, 0x2, 0x1}, r4}}, 0x120) 15:08:58 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000020c0), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, r1}, 0x10) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000004140)={0x90, 0x0, r1, {0x4, 0x0, 0x5, 0x100000001, 0xbd8c, 0x3, {0x5, 0x599, 0x0, 0x4, 0x2, 0x69e6, 0x3f, 0xffffffe5, 0x490e, 0xb000, 0x1, r3, r2, 0x7, 0x36}}}, 0x90) 15:08:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x8, 0x5, "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", 0x95, 0x80, 0x8, 0x3, 0x3f, 0x5}, r5}}, 0x128) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x8, 0x5, "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", 0x95, 0x80, 0x8, 0x3, 0x3f, 0x5}, r5}}, 0x128) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:08:58 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_SYS_OFFSET(r1, 0x43403d05, &(0x7f0000000240)={0x8}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000008}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000225bd7000fedbdf2502000000050047f335a9ad4dd035d86dc99b037fb802000a0000000400050004000500110b067ad58ead7c4e20000008000800ac149baa0800060000000000050000000a0000000400050014000700ff020000000000000000010000000000"], 0x60}}, 0x24040004) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), r2) 15:08:58 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) (async) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) (async, rerun: 32) ioctl$PTP_SYS_OFFSET(r1, 0x43403d05, &(0x7f0000000240)={0x8}) (async, rerun: 32) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000008}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000225bd7000fedbdf2502000000050047f335a9ad4dd035d86dc99b037fb802000a0000000400050004000500110b067ad58ead7c4e20000008000800ac149baa0800060000000000050000000a0000000400050014000700ff020000000000000000010000000000"], 0x60}}, 0x24040004) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) (async) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), r2) 15:08:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0x4}}, 0x10) 15:08:58 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async, rerun: 32) r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) (async, rerun: 32) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) (async) ioctl$PTP_SYS_OFFSET(r1, 0x43403d05, &(0x7f0000000240)={0x8}) (async, rerun: 32) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000008}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="000225bd7000fedbdf2502000000050047f335a9ad4dd035d86dc99b037fb802000a0000000400050004000500110b067ad58ead7c4e20000008000800ac149baa0800060000000000050000000a0000000400050014000700ff020000000000000000010000000000"], 0x60}}, 0x24040004) (async, rerun: 32) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) (async) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), r2) 15:08:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x3}}, 0xd) 15:08:58 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x7, 0x3, 0x6, 0x6, 0x0, 0xc3, 0x210, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xffffffff}, 0x694, 0x100000001, 0x6, 0x1, 0xca, 0x6, 0xff, 0x0, 0x8, 0x0, 0x7fff}, 0x0, 0x10, 0xffffffffffffffff, 0x8) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0xb7, 0x1f, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0xffff, 0x9}, 0x10400, 0xa05a, 0x4, 0x6, 0xba9, 0x400, 0xff80, 0x0, 0x7, 0x0, 0x100}, 0xffffffffffffffff, 0x5, r0, 0x3) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) 15:08:58 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x7, 0x3, 0x6, 0x6, 0x0, 0xc3, 0x210, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xffffffff}, 0x694, 0x100000001, 0x6, 0x1, 0xca, 0x6, 0xff, 0x0, 0x8, 0x0, 0x7fff}, 0x0, 0x10, 0xffffffffffffffff, 0x8) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0xb7, 0x1f, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0xffff, 0x9}, 0x10400, 0xa05a, 0x4, 0x6, 0xba9, 0x400, 0xff80, 0x0, 0x7, 0x0, 0x100}, 0xffffffffffffffff, 0x5, r0, 0x3) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) 15:08:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0x4}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0x4}}, 0x10) (async) 15:08:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x80000, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0xc715}}, 0x10) 15:08:58 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x7, 0x3, 0x6, 0x6, 0x0, 0xc3, 0x210, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xffffffff}, 0x694, 0x100000001, 0x6, 0x1, 0xca, 0x6, 0xff, 0x0, 0x8, 0x0, 0x7fff}, 0x0, 0x10, 0xffffffffffffffff, 0x8) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0xb7, 0x1f, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0xffff, 0x9}, 0x10400, 0xa05a, 0x4, 0x6, 0xba9, 0x400, 0xff80, 0x0, 0x7, 0x0, 0x100}, 0xffffffffffffffff, 0x5, r0, 0x3) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x7, 0x3, 0x6, 0x6, 0x0, 0xc3, 0x210, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xffffffff}, 0x694, 0x100000001, 0x6, 0x1, 0xca, 0x6, 0xff, 0x0, 0x8, 0x0, 0x7fff}, 0x0, 0x10, 0xffffffffffffffff, 0x8) (async) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0xb7, 0x1f, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0xffff, 0x9}, 0x10400, 0xa05a, 0x4, 0x6, 0xba9, 0x400, 0xff80, 0x0, 0x7, 0x0, 0x100}, 0xffffffffffffffff, 0x5, r0, 0x3) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) 15:08:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x3}}, 0xd) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x3}}, 0xd) (async) 15:08:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x8, 0x5, "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", 0x95, 0x80, 0x8, 0x3, 0x3f, 0x5}, r5}}, 0x128) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:08:58 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)="a84c648dd387a6df136505547aca5b32348151ddbf77f37228ed4a32c37041c2e5f9d8182569028187a4527d7b5b34691f1edef8ce9a09c1f31eae03701a9e9c43bef28f17237acf1e1fb7cbe62b2bb51a843e705ab867fb4c485e28e66f5d497caac725c9319196a72fdd2d9dbf3318c4975fe2e8b8d5b4aa81b833089a73df7cda9e185ee5c16b389407fb37b8afba5fb24a93a5b937ed25c9fe4ab0ca7536e8194c0d04d81718aee37fa330470f5fe0", &(0x7f0000000100)=@tcp6, 0x4}, 0x20) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2c4402, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000180)={0x20, 0x0, r1, {0x0, 0x1c}}, 0x20) ioctl$PTP_EXTTS_REQUEST(0xffffffffffffffff, 0x40103d02, &(0x7f00000001c0)={0x1, 0x8}) 15:08:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3, 0x4}}, 0x10) 15:08:58 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)="a84c648dd387a6df136505547aca5b32348151ddbf77f37228ed4a32c37041c2e5f9d8182569028187a4527d7b5b34691f1edef8ce9a09c1f31eae03701a9e9c43bef28f17237acf1e1fb7cbe62b2bb51a843e705ab867fb4c485e28e66f5d497caac725c9319196a72fdd2d9dbf3318c4975fe2e8b8d5b4aa81b833089a73df7cda9e185ee5c16b389407fb37b8afba5fb24a93a5b937ed25c9fe4ab0ca7536e8194c0d04d81718aee37fa330470f5fe0", &(0x7f0000000100)=@tcp6, 0x4}, 0x20) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2c4402, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000180)={0x20, 0x0, r1, {0x0, 0x1c}}, 0x20) ioctl$PTP_EXTTS_REQUEST(0xffffffffffffffff, 0x40103d02, &(0x7f00000001c0)={0x1, 0x8}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)="a84c648dd387a6df136505547aca5b32348151ddbf77f37228ed4a32c37041c2e5f9d8182569028187a4527d7b5b34691f1edef8ce9a09c1f31eae03701a9e9c43bef28f17237acf1e1fb7cbe62b2bb51a843e705ab867fb4c485e28e66f5d497caac725c9319196a72fdd2d9dbf3318c4975fe2e8b8d5b4aa81b833089a73df7cda9e185ee5c16b389407fb37b8afba5fb24a93a5b937ed25c9fe4ab0ca7536e8194c0d04d81718aee37fa330470f5fe0", &(0x7f0000000100)=@tcp6, 0x4}, 0x20) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2c4402, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000380)={0x2020}, 0x2020) (async) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000180)={0x20, 0x0, r1, {0x0, 0x1c}}, 0x20) (async) ioctl$PTP_EXTTS_REQUEST(0xffffffffffffffff, 0x40103d02, &(0x7f00000001c0)={0x1, 0x8}) (async) 15:08:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x3}}, 0xd) 15:08:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x11}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 15:08:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) 15:08:58 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)="a84c648dd387a6df136505547aca5b32348151ddbf77f37228ed4a32c37041c2e5f9d8182569028187a4527d7b5b34691f1edef8ce9a09c1f31eae03701a9e9c43bef28f17237acf1e1fb7cbe62b2bb51a843e705ab867fb4c485e28e66f5d497caac725c9319196a72fdd2d9dbf3318c4975fe2e8b8d5b4aa81b833089a73df7cda9e185ee5c16b389407fb37b8afba5fb24a93a5b937ed25c9fe4ab0ca7536e8194c0d04d81718aee37fa330470f5fe0", &(0x7f0000000100)=@tcp6, 0x4}, 0x20) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2c4402, 0x0) (async) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000180)={0x20, 0x0, r1, {0x0, 0x1c}}, 0x20) (async) ioctl$PTP_EXTTS_REQUEST(0xffffffffffffffff, 0x40103d02, &(0x7f00000001c0)={0x1, 0x8}) 15:08:58 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x2f0002, 0x0) 15:08:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:08:59 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x2f0002, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x2f0002, 0x0) (async) 15:08:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x11}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 15:08:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e22, 0x0, @local, 0xb002}, r4}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:08:59 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x2f0002, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x2f0002, 0x0) (async) 15:08:59 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = getpgid(0x0) getpgid(r1) write$FUSE_LK(r0, &(0x7f0000000080)={0x28, 0xfffffffffffffffe, 0x0, {{0x7, 0x5, 0x0, r1}}}, 0x28) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) 15:08:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:08:59 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = getpgid(0x0) getpgid(r1) (async) write$FUSE_LK(r0, &(0x7f0000000080)={0x28, 0xfffffffffffffffe, 0x0, {{0x7, 0x5, 0x0, r1}}}, 0x28) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) 15:08:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x11}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 15:08:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) 15:08:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e22, 0x0, @local, 0xb002}, r4}}, 0x38) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (rerun: 32) 15:08:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x2}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (rerun: 64) 15:08:59 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = getpgid(0x0) getpgid(r1) write$FUSE_LK(r0, &(0x7f0000000080)={0x28, 0xfffffffffffffffe, 0x0, {{0x7, 0x5, 0x0, r1}}}, 0x28) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) 15:08:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x553070c8}}, 0x10) 15:08:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x553070c8}}, 0x10) 15:08:59 executing program 5: ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x78303530, 0x1, 0x4}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r2, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f00000023c0)={0x28, 0x0, r4}, 0x28) write$FUSE_POLL(r2, &(0x7f0000000000)={0x18, 0x0, r4, {0x5}}, 0x18) 15:08:59 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000080)="1649c0be5228ec14ccd672fd130ebcca3a856816d274658e15ac62026d33abde606f54ae227a86f7b9af081f2be5cc4297271921c35d0886665e6a99d88dcf7023c89f", &(0x7f0000000000)=""/44, &(0x7f0000000100)="06961265f8e053ec1aced9ad90a9d544a0edd67c158ce15df2a6dd0d74734f7cfb423f3fcfeb47cc6ff1f69691f11d3bc435c8ed65a6c146c7716f5191b052e9949aba14ffacc103d53bf493ebe100c6af669c5aa0399ecd984a2b3eadb5ea835ba0ddd3146c01b83b43c9e22d7bc4ab0b80", &(0x7f0000000180)="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", 0x5, 0x1, 0x4}, 0x38) 15:08:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x553070c8}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x553070c8}}, 0x10) (async) 15:08:59 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000080)="1649c0be5228ec14ccd672fd130ebcca3a856816d274658e15ac62026d33abde606f54ae227a86f7b9af081f2be5cc4297271921c35d0886665e6a99d88dcf7023c89f", &(0x7f0000000000)=""/44, &(0x7f0000000100)="06961265f8e053ec1aced9ad90a9d544a0edd67c158ce15df2a6dd0d74734f7cfb423f3fcfeb47cc6ff1f69691f11d3bc435c8ed65a6c146c7716f5191b052e9949aba14ffacc103d53bf493ebe100c6af669c5aa0399ecd984a2b3eadb5ea835ba0ddd3146c01b83b43c9e22d7bc4ab0b80", &(0x7f0000000180)="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", 0x5, 0x1, 0x4}, 0x38) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000080)="1649c0be5228ec14ccd672fd130ebcca3a856816d274658e15ac62026d33abde606f54ae227a86f7b9af081f2be5cc4297271921c35d0886665e6a99d88dcf7023c89f", &(0x7f0000000000)=""/44, &(0x7f0000000100)="06961265f8e053ec1aced9ad90a9d544a0edd67c158ce15df2a6dd0d74734f7cfb423f3fcfeb47cc6ff1f69691f11d3bc435c8ed65a6c146c7716f5191b052e9949aba14ffacc103d53bf493ebe100c6af669c5aa0399ecd984a2b3eadb5ea835ba0ddd3146c01b83b43c9e22d7bc4ab0b80", &(0x7f0000000180)="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", 0x5, 0x1, 0x4}, 0x38) (async) 15:08:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x0, {0xa, 0x4e22, 0x0, @local, 0xb002}, r4}}, 0x38) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:08:59 executing program 5: ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x78303530, 0x1, 0x4}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r2, 0x0, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f00000023c0)={0x28, 0x0, r4}, 0x28) write$FUSE_POLL(r2, &(0x7f0000000000)={0x18, 0x0, r4, {0x5}}, 0x18) ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x78303530, 0x1, 0x4}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) read$FUSE(r2, 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r3, &(0x7f0000000380)={0x2020}, 0x2020) (async) write$FUSE_LK(r3, &(0x7f00000023c0)={0x28, 0x0, r4}, 0x28) (async) write$FUSE_POLL(r2, &(0x7f0000000000)={0x18, 0x0, r4, {0x5}}, 0x18) (async) 15:09:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) 15:09:00 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async, rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={&(0x7f0000000080)="1649c0be5228ec14ccd672fd130ebcca3a856816d274658e15ac62026d33abde606f54ae227a86f7b9af081f2be5cc4297271921c35d0886665e6a99d88dcf7023c89f", &(0x7f0000000000)=""/44, &(0x7f0000000100)="06961265f8e053ec1aced9ad90a9d544a0edd67c158ce15df2a6dd0d74734f7cfb423f3fcfeb47cc6ff1f69691f11d3bc435c8ed65a6c146c7716f5191b052e9949aba14ffacc103d53bf493ebe100c6af669c5aa0399ecd984a2b3eadb5ea835ba0ddd3146c01b83b43c9e22d7bc4ab0b80", &(0x7f0000000180)="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", 0x5, 0x1, 0x4}, 0x38) (rerun: 64) 15:09:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:00 executing program 5: ioctl$PTP_PIN_GETFUNC(0xffffffffffffffff, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x78303530, 0x1, 0x4}) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r2, 0x0, 0x0) (async, rerun: 64) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) read$FUSE(r3, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f00000023c0)={0x28, 0x0, r4}, 0x28) (async) write$FUSE_POLL(r2, &(0x7f0000000000)={0x18, 0x0, r4, {0x5}}, 0x18) 15:09:00 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040), 0xc) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0xfffffffffffffffe, r1}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 15:09:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:00 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040), 0xc) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0xfffffffffffffffe, r1}, 0x20) (async) socket$l2tp(0x2, 0x2, 0x73) 15:09:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1, 0x7, 0x7, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x2, &(0x7f0000000040)=@raw=[@cb_func={0x18, 0x1, 0x4, 0x0, 0x6}], &(0x7f0000000080)='GPL\x00', 0x8000, 0xcd, &(0x7f00000000c0)=""/205, 0x41000, 0x4, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x4, 0x6, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0x1, r0]}, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 15:09:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1, 0x7, 0x7, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x2, &(0x7f0000000040)=@raw=[@cb_func={0x18, 0x1, 0x4, 0x0, 0x6}], &(0x7f0000000080)='GPL\x00', 0x8000, 0xcd, &(0x7f00000000c0)=""/205, 0x41000, 0x4, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x4, 0x6, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0x1, r0]}, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:01 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040), 0xc) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0xfffffffffffffffe, r1}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 15:09:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x4008}}, 0x10) 15:09:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1f, r5, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:01 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1, 0x7, 0x7, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x5, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x16, 0x2, &(0x7f0000000040)=@raw=[@cb_func={0x18, 0x1, 0x4, 0x0, 0x6}], &(0x7f0000000080)='GPL\x00', 0x8000, 0xcd, &(0x7f00000000c0)=""/205, 0x41000, 0x4, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0x4, 0x6, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0x1, r0]}, 0x80) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x4008}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x4008}}, 0x10) (async) 15:09:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x2, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) 15:09:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x10000, @loopback, 0x5}, {0xa, 0x4e21, 0x3, @rand_addr=' \x01\x00', 0x7fff}, r3, 0xd295}}, 0x48) mq_open(&(0x7f0000000000)=':]}}\x00', 0x0, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1f, r5, 0x0, 0x0, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:01 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x181000, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000040)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x67, 0x7f, 0x7, 0x0, 0x40, 0x4202, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x40030, 0x8839, 0x4, 0x7, 0x95dd, 0x401, 0x6, 0x0, 0x4d, 0x0, 0x813}, r1, 0xc, 0xffffffffffffffff, 0x3) 15:09:01 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x181000, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000040)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x67, 0x7f, 0x7, 0x0, 0x40, 0x4202, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x40030, 0x8839, 0x4, 0x7, 0x95dd, 0x401, 0x6, 0x0, 0x4d, 0x0, 0x813}, r1, 0xc, 0xffffffffffffffff, 0x3) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x181000, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)) (async) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000040)) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x67, 0x7f, 0x7, 0x0, 0x40, 0x4202, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x40030, 0x8839, 0x4, 0x7, 0x95dd, 0x401, 0x6, 0x0, 0x4d, 0x0, 0x813}, r1, 0xc, 0xffffffffffffffff, 0x3) (async) 15:09:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x4008}}, 0x10) 15:09:01 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x181000, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000040)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x67, 0x7f, 0x7, 0x0, 0x40, 0x4202, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x40030, 0x8839, 0x4, 0x7, 0x95dd, 0x401, 0x6, 0x0, 0x4d, 0x0, 0x813}, r1, 0xc, 0xffffffffffffffff, 0x3) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x181000, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)) (async) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000040)) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x66, 0x67, 0x7f, 0x7, 0x0, 0x40, 0x4202, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x40030, 0x8839, 0x4, 0x7, 0x95dd, 0x401, 0x6, 0x0, 0x4d, 0x0, 0x813}, r1, 0xc, 0xffffffffffffffff, 0x3) (async) 15:09:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 15:09:01 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f00000000c0)={'\x00', 0x3, 0x2, 0x3}) 15:09:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000180)={0x0, 0x1, 0x0, &(0x7f0000000300)=[{}], 0x0, 0x0, &(0x7f0000000300), 0x3, 0x0, &(0x7f0000000100)=[{}, {}, {}], 0x0, 0x0, &(0x7f0000000480)}) 15:09:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0xfeb4, 0xfa00, {r1}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x0, {0x80000000, 0x3, "9627ee4b8135a11d10b0d8e33c1d8894e08843428cb1693905e2585950c96890afac7ef7eb4424c6ddd8a887f7c3f35f0d5b3f9a12ffbca763b0fd1d56ee90a4672f8600e7ce30ea74a38a0a02fccbf53f555358efa36c38f072d7e39e8e22cdfc1c3ae9f395b6a75abe283e948521d479b72c58483dd33792cbfe637ddb6d95b1b4655b047e69175735077f3650347bd7243b6d0ec33f4d2a61e882f02b91969440b18041dadb9ee4fb0df761c029ed4956db0da63a79b1da75a1ef6e3b5cca633ada9342c2f376f558f6ea64671569ef09668f731d1506acaa2c589afd2c2c60045c17f971c4b51d73b94fec69a0d655d23f4fb46d0796f6ac5de3dbef8611", 0x40, 0xff, 0x2, 0xf5, 0xff, 0x5, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x3f, "a554648706b0f4da76b8cab3f5034cb2f836d41b547a9d141a66ae09c8193b9b3c54d5139265fde4ed7ac3efded4b4bec3f6c51ec420ad9d68c8e70c6562fe6ac398ff614b25c33d386af55f13cfa0b3d0a8de13f42547b50709e2f216c6cc94c07a8f17e8c1ae06e8ec016425d1a2d7a0d44111eb40ba35f6699986344d9e44d0835db4d9a939c11e49a9e4ecde1094fbd01c0e2660b09ac3aa4841bb925e60f19303eb2affb4e1b145e3131bfb5c9845b0c2390900000075674997bc88384c86456e338b26ba685fb3f7ff3838583d2f7f84337cf992951da46f46235c0d8b209173e400", 0x2c, 0x22, 0x0, 0x9, 0x6, 0xaf, 0x20}, r5}}, 0x128) 15:09:01 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f00000000c0)={'\x00', 0x3, 0x2, 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) (async) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f00000000c0)={'\x00', 0x3, 0x2, 0x3}) (async) 15:09:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x10000, @loopback, 0x5}, {0xa, 0x4e21, 0x3, @rand_addr=' \x01\x00', 0x7fff}, r3, 0xd295}}, 0x48) mq_open(&(0x7f0000000000)=':]}}\x00', 0x0, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1f, r5, 0x0, 0x0, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:01 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f00000000c0)={'\x00', 0x3, 0x2, 0x3}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) (async) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f00000000c0)={'\x00', 0x3, 0x2, 0x3}) (async) 15:09:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000180)={0x0, 0x1, 0x0, &(0x7f0000000300)=[{}], 0x0, 0x0, &(0x7f0000000300), 0x3, 0x0, &(0x7f0000000100)=[{}, {}, {}], 0x0, 0x0, &(0x7f0000000480)}) 15:09:01 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x842, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000002c0)={'\x00', 0x1ff, 0x0, 0x80000000}) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000200)={0x101, 0xa}) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f0000000180)={'\x00', 0x4, 0x3, 0x80000001}) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f00000000c0)={{0x323, 0x7fffffff}, {0xbf27, 0x5}, 0x5, 0x1}) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000040)={'\x00', 0x1000, 0x2, 0x8}) socketpair(0x34, 0x9a2d2076cc5bbde9, 0x5, &(0x7f0000000280)) 15:09:01 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x842, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000002c0)={'\x00', 0x1ff, 0x0, 0x80000000}) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000200)={0x101, 0xa}) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f0000000180)={'\x00', 0x4, 0x3, 0x80000001}) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f00000000c0)={{0x323, 0x7fffffff}, {0xbf27, 0x5}, 0x5, 0x1}) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000040)={'\x00', 0x1000, 0x2, 0x8}) socketpair(0x34, 0x9a2d2076cc5bbde9, 0x5, &(0x7f0000000280)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x842, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000002c0)={'\x00', 0x1ff, 0x0, 0x80000000}) (async) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000140)) (async) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000200)={0x101, 0xa}) (async) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f0000000180)={'\x00', 0x4, 0x3, 0x80000001}) (async) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f00000000c0)={{0x323, 0x7fffffff}, {0xbf27, 0x5}, 0x5, 0x1}) (async) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)) (async) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000040)={'\x00', 0x1000, 0x2, 0x8}) (async) socketpair(0x34, 0x9a2d2076cc5bbde9, 0x5, &(0x7f0000000280)) (async) 15:09:01 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x842, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000002c0)={'\x00', 0x1ff, 0x0, 0x80000000}) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000200)={0x101, 0xa}) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f0000000180)={'\x00', 0x4, 0x3, 0x80000001}) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f00000000c0)={{0x323, 0x7fffffff}, {0xbf27, 0x5}, 0x5, 0x1}) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000040)={'\x00', 0x1000, 0x2, 0x8}) socketpair(0x34, 0x9a2d2076cc5bbde9, 0x5, &(0x7f0000000280)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x842, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f00000002c0)={'\x00', 0x1ff, 0x0, 0x80000000}) (async) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000140)) (async) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000200)={0x101, 0xa}) (async) ioctl$PTP_PIN_SETFUNC(r1, 0x40603d07, &(0x7f0000000180)={'\x00', 0x4, 0x3, 0x80000001}) (async) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f00000000c0)={{0x323, 0x7fffffff}, {0xbf27, 0x5}, 0x5, 0x1}) (async) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000140)) (async) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000040)={'\x00', 0x1000, 0x2, 0x8}) (async) socketpair(0x34, 0x9a2d2076cc5bbde9, 0x5, &(0x7f0000000280)) (async) 15:09:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000180)={0x0, 0x1, 0x0, &(0x7f0000000300)=[{}], 0x0, 0x0, &(0x7f0000000300), 0x3, 0x0, &(0x7f0000000100)=[{}, {}, {}], 0x0, 0x0, &(0x7f0000000480)}) 15:09:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x10000, @loopback, 0x5}, {0xa, 0x4e21, 0x3, @rand_addr=' \x01\x00', 0x7fff}, r3, 0xd295}}, 0x48) (async, rerun: 64) mq_open(&(0x7f0000000000)=':]}}\x00', 0x0, 0x0, 0x0) (async, rerun: 64) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0xfeb4, 0xfa00, {r1}}, 0x10) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x0, {0x80000000, 0x3, "9627ee4b8135a11d10b0d8e33c1d8894e08843428cb1693905e2585950c96890afac7ef7eb4424c6ddd8a887f7c3f35f0d5b3f9a12ffbca763b0fd1d56ee90a4672f8600e7ce30ea74a38a0a02fccbf53f555358efa36c38f072d7e39e8e22cdfc1c3ae9f395b6a75abe283e948521d479b72c58483dd33792cbfe637ddb6d95b1b4655b047e69175735077f3650347bd7243b6d0ec33f4d2a61e882f02b91969440b18041dadb9ee4fb0df761c029ed4956db0da63a79b1da75a1ef6e3b5cca633ada9342c2f376f558f6ea64671569ef09668f731d1506acaa2c589afd2c2c60045c17f971c4b51d73b94fec69a0d655d23f4fb46d0796f6ac5de3dbef8611", 0x40, 0xff, 0x2, 0xf5, 0xff, 0x5, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x3f, "a554648706b0f4da76b8cab3f5034cb2f836d41b547a9d141a66ae09c8193b9b3c54d5139265fde4ed7ac3efded4b4bec3f6c51ec420ad9d68c8e70c6562fe6ac398ff614b25c33d386af55f13cfa0b3d0a8de13f42547b50709e2f216c6cc94c07a8f17e8c1ae06e8ec016425d1a2d7a0d44111eb40ba35f6699986344d9e44d0835db4d9a939c11e49a9e4ecde1094fbd01c0e2660b09ac3aa4841bb925e60f19303eb2affb4e1b145e3131bfb5c9845b0c2390900000075674997bc88384c86456e338b26ba685fb3f7ff3838583d2f7f84337cf992951da46f46235c0d8b209173e400", 0x2c, 0x22, 0x0, 0x9, 0x6, 0xaf, 0x20}, r5}}, 0x128) (rerun: 32) 15:09:01 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000480)={0x2, 0x7ff}) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002540)={0x20, 0xffffffffffffffda, r4, {0x0, 0xa}}, 0x20) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000400)={{0xfffffffffffffffd}, {}, 0x6, 0x10000000}) openat$ptp0(0xffffffffffffff9c, &(0x7f00000004c0), 0x1c1342, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r5, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_SYS_OFFSET(r5, 0x43403d05, &(0x7f0000000080)={0x13}) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) 15:09:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x2, {0x6, 0x545a, "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", 0x75, 0xa, 0x2, 0x2, 0x61, 0xff, 0x0, 0xff}, r1}}, 0x128) 15:09:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e23, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x16}, r1}}, 0x38) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000005c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000440)}}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0xfc, "fdcbce", "b3bb1c60f08d7d36f06c6ec89c6683f301f16b60b7cc0b77a5add23360e5bc5553a2ba75e02bb2f11bdd7a2c53ad6427b62c6aa117505b56f9fb8a32b6774fdf7a5c945fea8062f8b915705de5fc094518eac9e220263a182046108bb54543c51fe7677e669ac7119e02daf987d017d79e8b5a43811884012374e5fc7b3795e8ad55e099693ab141a9887be9145b87bbaf28b8554580d32452ae601ef1e6fe3aed6bf02e159841cc3f9b6bee4e65fc4d249ded04267db6e6014a5ba02df5917a0a374f6b399a903238b55e26898e8b1b5b43cb28f21f9fb3a5792e9ddbdb3e3646ba310a52a0cc94f732e23e31fa66dc69789bf97d476be9e4f9235426e35225"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0x77ff2576b0bf70b3}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000680)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x0, {0xa, 0x4e20, 0x101, @loopback}, r6}}, 0x38) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000640)={0xf, 0x8, 0xfa00, {r3, 0x1}}, 0x10) 15:09:01 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async, rerun: 32) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000480)={0x2, 0x7ff}) (async) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async, rerun: 32) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (rerun: 32) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002540)={0x20, 0xffffffffffffffda, r4, {0x0, 0xa}}, 0x20) (async, rerun: 64) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000400)={{0xfffffffffffffffd}, {}, 0x6, 0x10000000}) (async, rerun: 64) openat$ptp0(0xffffffffffffff9c, &(0x7f00000004c0), 0x1c1342, 0x0) (async) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r5, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_SYS_OFFSET(r5, 0x43403d05, &(0x7f0000000080)={0x13}) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) 15:09:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r1, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xb3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x4008800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:09:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x2, {0x6, 0x545a, "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", 0x75, 0xa, 0x2, 0x2, 0x61, 0xff, 0x0, 0xff}, r1}}, 0x128) 15:09:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r1, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xb3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x4008800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r1, 0x19731f61430f9147}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xb3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x4008800) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) (async) 15:09:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0xfeb4, 0xfa00, {r1}}, 0x10) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x0, {0x80000000, 0x3, "9627ee4b8135a11d10b0d8e33c1d8894e08843428cb1693905e2585950c96890afac7ef7eb4424c6ddd8a887f7c3f35f0d5b3f9a12ffbca763b0fd1d56ee90a4672f8600e7ce30ea74a38a0a02fccbf53f555358efa36c38f072d7e39e8e22cdfc1c3ae9f395b6a75abe283e948521d479b72c58483dd33792cbfe637ddb6d95b1b4655b047e69175735077f3650347bd7243b6d0ec33f4d2a61e882f02b91969440b18041dadb9ee4fb0df761c029ed4956db0da63a79b1da75a1ef6e3b5cca633ada9342c2f376f558f6ea64671569ef09668f731d1506acaa2c589afd2c2c60045c17f971c4b51d73b94fec69a0d655d23f4fb46d0796f6ac5de3dbef8611", 0x40, 0xff, 0x2, 0xf5, 0xff, 0x5, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x3f, "a554648706b0f4da76b8cab3f5034cb2f836d41b547a9d141a66ae09c8193b9b3c54d5139265fde4ed7ac3efded4b4bec3f6c51ec420ad9d68c8e70c6562fe6ac398ff614b25c33d386af55f13cfa0b3d0a8de13f42547b50709e2f216c6cc94c07a8f17e8c1ae06e8ec016425d1a2d7a0d44111eb40ba35f6699986344d9e44d0835db4d9a939c11e49a9e4ecde1094fbd01c0e2660b09ac3aa4841bb925e60f19303eb2affb4e1b145e3131bfb5c9845b0c2390900000075674997bc88384c86456e338b26ba685fb3f7ff3838583d2f7f84337cf992951da46f46235c0d8b209173e400", 0x2c, 0x22, 0x0, 0x9, 0x6, 0xaf, 0x20}, r5}}, 0x128) 15:09:01 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000480)={0x2, 0x7ff}) (async) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002540)={0x20, 0xffffffffffffffda, r4, {0x0, 0xa}}, 0x20) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000400)={{0xfffffffffffffffd}, {}, 0x6, 0x10000000}) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f00000004c0), 0x1c1342, 0x0) (async) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r5, 0x40383d03, &(0x7f0000000140)) (async) ioctl$PTP_SYS_OFFSET(r5, 0x43403d05, &(0x7f0000000080)={0x13}) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) 15:09:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r1, 0x19731f61430f9147}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xb3}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x4008800) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:09:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async, rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x2, {0x6, 0x545a, "3697697124a62e8aca37295a87fc4b791b824b5e54a13e8d3b17b00d9320c35bf5f7ac3efdf9a55208e415bff7ff845590faaef6c005014ab9e80b46a2eb6b13efd6f465c7ae8e90005c0d0bd2265d89a2a654118f1e0596951a3f581849d0b4951020cd6eed22bb03ad73dc58852b4cfc7e3e15d2f8e00e15f8a7dff22985f2d663a23232d4fcb51226c5bca47d6bb2dec279aaf87c021d6cdac93d4f102ad0df5e2c3cbf93bad328874822e964c0fa467996cd8781bfd2aa544b947582b3bfc33cc85b68f78883ea7edcddc51e71dabf01b12c50d623d5c8a062161c5e2d204ebdf902bef9a888409546a75020f4d637b31fa22ada0943a748357274c16464", 0x75, 0xa, 0x2, 0x2, 0x61, 0xff, 0x0, 0xff}, r1}}, 0x128) (rerun: 32) 15:09:01 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) 15:09:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xa}}, 0xffc6) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x1, 0xfff, "7852dc43c3cc22d714db422d122654e8cc90d0a981f9f59d8e76d84f0cae59ad172261fb998f9eba342e42790ff221d18156ea264aba01a5a2aed21df13e46bd701cf9277356c2ab7de5646b6784702047188a11254a83f14d439eeed000e9cac46d2864c4730c489207388682e2ffdbe7528ee61caf64fbb94c8f4c9e3dbbd2ccdeebed108421a200f22969cb0d71d70927d13ad796ea3ca03116271d62df48df52b0aade22b3ff81dc96e728ef7c2f161073262783a75b6d9013644d16dbbba9a620a3f8bcc7f12a305d77c0edf07772614d65057d8ffb83ac7fe67efcdcf2083d922e39ed5ec374388eebfb22616c5d59a18b5b25cb31f8ca1e53fc8aa403", 0x2, 0x3, 0x40, 0x3, 0x1, 0x47, 0x40}, r6}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r7) 15:09:02 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) 15:09:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e23, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x16}, r1}}, 0x38) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000005c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000440)}}, 0x10) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0xfc, "fdcbce", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0x77ff2576b0bf70b3}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000680)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x0, {0xa, 0x4e20, 0x101, @loopback}, r6}}, 0x38) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000640)={0xf, 0x8, 0xfa00, {r3, 0x1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x2, {0xa, 0x4e23, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x16}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000005c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000440)}}, 0x10) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0xfc, "fdcbce", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380), 0x13f, 0x77ff2576b0bf70b3}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000680)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x0, {0xa, 0x4e20, 0x101, @loopback}, r6}}, 0x38) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000640)={0xf, 0x8, 0xfa00, {r3, 0x1}}, 0x10) (async) 15:09:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {r3, 0x2, "8a97ab", "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"}}, 0x110) 15:09:02 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) 15:09:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r4, 0x8, "e4b441", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 15:09:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xa}}, 0xffc6) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x1, 0xfff, "7852dc43c3cc22d714db422d122654e8cc90d0a981f9f59d8e76d84f0cae59ad172261fb998f9eba342e42790ff221d18156ea264aba01a5a2aed21df13e46bd701cf9277356c2ab7de5646b6784702047188a11254a83f14d439eeed000e9cac46d2864c4730c489207388682e2ffdbe7528ee61caf64fbb94c8f4c9e3dbbd2ccdeebed108421a200f22969cb0d71d70927d13ad796ea3ca03116271d62df48df52b0aade22b3ff81dc96e728ef7c2f161073262783a75b6d9013644d16dbbba9a620a3f8bcc7f12a305d77c0edf07772614d65057d8ffb83ac7fe67efcdcf2083d922e39ed5ec374388eebfb22616c5d59a18b5b25cb31f8ca1e53fc8aa403", 0x2, 0x3, 0x40, 0x3, 0x1, 0x47, 0x40}, r6}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) (async) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r7) 15:09:02 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) read$ptp(r0, &(0x7f0000000000)=""/8, 0x8) 15:09:02 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) read$ptp(r0, &(0x7f0000000000)=""/8, 0x8) 15:09:02 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) read$ptp(r0, &(0x7f0000000000)=""/8, 0x8) 15:09:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {r3, 0x2, "8a97ab", "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"}}, 0x110) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x2, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {r3, 0x2, "8a97ab", "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"}}, 0x110) (async) 15:09:02 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0xc4c03d09, &(0x7f0000000080)={0xd}) 15:09:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r4, 0x8, "e4b441", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r4, 0x8, "e4b441", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) (async) 15:09:02 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0xc4c03d09, &(0x7f0000000080)={0xd}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0xc4c03d09, &(0x7f0000000080)={0xd}) (async) 15:09:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e23, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x16}, r1}}, 0x38) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000005c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000440)}}, 0x10) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0xfc, "fdcbce", "b3bb1c60f08d7d36f06c6ec89c6683f301f16b60b7cc0b77a5add23360e5bc5553a2ba75e02bb2f11bdd7a2c53ad6427b62c6aa117505b56f9fb8a32b6774fdf7a5c945fea8062f8b915705de5fc094518eac9e220263a182046108bb54543c51fe7677e669ac7119e02daf987d017d79e8b5a43811884012374e5fc7b3795e8ad55e099693ab141a9887be9145b87bbaf28b8554580d32452ae601ef1e6fe3aed6bf02e159841cc3f9b6bee4e65fc4d249ded04267db6e6014a5ba02df5917a0a374f6b399a903238b55e26898e8b1b5b43cb28f21f9fb3a5792e9ddbdb3e3646ba310a52a0cc94f732e23e31fa66dc69789bf97d476be9e4f9235426e35225"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0x77ff2576b0bf70b3}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000680)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x0, {0xa, 0x4e20, 0x101, @loopback}, r6}}, 0x38) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000640)={0xf, 0x8, 0xfa00, {r3, 0x1}}, 0x10) 15:09:02 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0xc4c03d09, &(0x7f0000000080)={0xd}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$PTP_SYS_OFFSET_EXTENDED(r0, 0xc4c03d09, &(0x7f0000000080)={0xd}) (async) 15:09:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {r3, 0x2, "8a97ab", "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"}}, 0x110) 15:09:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xa}}, 0xffc6) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async, rerun: 32) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 32) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x1, 0xfff, "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", 0x2, 0x3, 0x40, 0x3, 0x1, 0x47, 0x40}, r6}}, 0x120) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) (async, rerun: 64) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (rerun: 64) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r7) 15:09:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r4, 0x8, "e4b441", "7abfc4dfebaae3ecb654485bcbb2d523d05b194cea2f104e88df58ab7e94d2211444982dbcf35b2703f0b14e5c499ca127caf52074c5bdfcb699307c9adf9b586b4f579e9695d305f6dfe260e4c16a423f38267e875fc03d5294bb9f4cf5eb98a9152572c89fb0554f1c03a075a3f4287a9e7668d6f00f6726fe7634803188231aec50172e05c472ffa1b8ff3b4704fd643f4f99978df25914168fb8ffaa3b8caf7900e31c8c95091be284996228ff5f33d59fe222966c6b34bf5f260ca54b3dcb67faab10831087779501c51533e1cd21d845550d3234c5dd60fb8f4e302e9d1730c4a926dcf51cd2ae9742b0f91b6ba903e9ccc8e83130fa40084cefd24816"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r4, 0x8, "e4b441", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) (async) 15:09:02 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x462180, 0x0) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) 15:09:02 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x2) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (async) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x462180, 0x0) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) 15:09:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x2}}, 0x20) 15:09:02 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x2) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (async) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x462180, 0x0) ioctl$PTP_PEROUT_REQUEST(r1, 0x40383d03, &(0x7f0000000140)) 15:09:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x2}}, 0x20) (async) 15:09:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0x4, 0x0, 0x3}) 15:09:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0x3f, "f99d37", "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"}}, 0x110) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) socketpair(0x21, 0x5, 0x655b, &(0x7f0000000080)={0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r2) 15:09:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, r4}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111, 0x4}}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x1, 0x401, 0x5, 0x80, r0, 0x4e0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x18, r7, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r5, 0x4) 15:09:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x2}}, 0x20) 15:09:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0x3f, "f99d37", "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"}}, 0x110) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) socketpair(0x21, 0x5, 0x655b, &(0x7f0000000080)={0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100), 0x111, 0xe}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0x3f, "f99d37", "9bed3434d319cb2c3ca9dcb4ff4600811d91fe7af69ab260cf5ebbe2f6a469869e5a4e6569698f25ad75d0b2b8a9fe73f1735bc3fbf042fc2eb5deddf42873d35a3553321b278a7de3ca2684c1fb7b2cff5385eeab01d9599e26caa0dda10b2f6b69a0475d09d18dc49fcf712a992b33c209f23f791335a970767afd01dadc716ddf6d1f4ffae716504728266d3f510062f56d92de31d852e22eeff26483038e4ece523084b93b09c6d59ab9945b7f46e73630749a351913105f76487107eb1da8bd4fe8db6b337ee4ba6b3ec3b9e313203cbcd29e613a228ee125ebaff29150fa3a1465aac5ce1e99d7c27ffacf665c016a4ef223bf6b6a3c54f745e498f071"}}, 0x110) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) socketpair(0x21, 0x5, 0x655b, &(0x7f0000000080)) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r2) (async) 15:09:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x10000, @loopback, 0x5}, {0xa, 0x4e21, 0x3, @rand_addr=' \x01\x00', 0x7fff}, r3, 0xd295}}, 0x48) mq_open(&(0x7f0000000000)=':]}}\x00', 0x0, 0x0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x8, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x8000, @mcast2, 0x9fb}, @in={0x2, 0x4e23, @remote}}}, 0x118) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000440)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x5, @ipv4={'\x00', '\xff\xff', @loopback}, 0x800}, r4}}, 0x30) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in={0x2, 0x4e21, @multicast1}}}, 0x90) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND(r9, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in={0x2, 0x4e20, @multicast2}}}, 0x90) 15:09:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0x4, 0x0, 0x3}) 15:09:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0x3f, "f99d37", "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"}}, 0x110) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) socketpair(0x21, 0x5, 0x655b, &(0x7f0000000080)={0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r2) 15:09:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5, 0x2}}, 0x18) 15:09:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) ioctl$PTP_PIN_GETFUNC2(0xffffffffffffffff, 0xc0603d0f, &(0x7f0000000080)={'\x00', 0x4, 0x0, 0x3}) 15:09:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, r4}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111, 0x4}}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x1, 0x401, 0x5, 0x80, r0, 0x4e0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x18, r7, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r5, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, r4}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111, 0x4}}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x1, 0x401, 0x5, 0x80, r0, 0x4e0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$TIPC_NL_BEARER_DISABLE(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x18, r7, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r5, 0x4) (async) 15:09:03 executing program 1: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000000), &(0x7f0000000080)=[{}, {{0x80000000, 0x0}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000a40)={0x0, 0x7, 0x0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000880)=[{0x0, 0x80000000, 0x0, {0x0}}], 0xa, 0x0, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f0000000240)={{0x80000000, r0, 0x2, [0x1, 0x2]}, {0x80000000, r1, 0x1, [0x7, 0x10001]}, 0x1, [0xc1c0, 0x3ff]}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:09:03 executing program 1: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000000), &(0x7f0000000080)=[{}, {{0x80000000, 0x0}}]}) (async) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000a40)={0x0, 0x7, 0x0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000880)=[{0x0, 0x80000000, 0x0, {0x0}}], 0xa, 0x0, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) (async) socket$nl_generic(0x10, 0x3, 0x10) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f0000000240)={{0x80000000, r0, 0x2, [0x1, 0x2]}, {0x80000000, r1, 0x1, [0x7, 0x10001]}, 0x1, [0xc1c0, 0x3ff]}) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) 15:09:03 executing program 1: ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000000), &(0x7f0000000080)=[{}, {{0x80000000, 0x0}}]}) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000a40)={0x0, 0x7, 0x0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000880)=[{0x0, 0x80000000, 0x0, {0x0}}], 0xa, 0x0, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f0000000240)={{0x80000000, r0, 0x2, [0x1, 0x2]}, {0x80000000, r1, 0x1, [0x7, 0x10001]}, 0x1, [0xc1c0, 0x3ff]}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000100)={0x80000000, &(0x7f0000000000), &(0x7f0000000080)}) (async) ioctl$MEDIA_IOC_ENUM_LINKS(0xffffffffffffffff, 0xc0287c02, &(0x7f0000000200)={0x80000000, &(0x7f0000000140), &(0x7f0000000180)}) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000a40)={0x0, 0x7, 0x0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x1, 0x0, &(0x7f0000000880)=[{}], 0xa, 0x0, &(0x7f0000000ac0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f0000000240)={{0x80000000, r0, 0x2, [0x1, 0x2]}, {0x80000000, r1, 0x1, [0x7, 0x10001]}, 0x1, [0xc1c0, 0x3ff]}) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) 15:09:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1f, r5, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:03 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(0xffffffffffffffff, 0xc4c03d09, &(0x7f0000000080)={0x1540}) 15:09:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async, rerun: 32) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x8, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x8000, @mcast2, 0x9fb}, @in={0x2, 0x4e23, @remote}}}, 0x118) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000440)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x5, @ipv4={'\x00', '\xff\xff', @loopback}, 0x800}, r4}}, 0x30) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in={0x2, 0x4e21, @multicast1}}}, 0x90) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND(r9, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in={0x2, 0x4e20, @multicast2}}}, 0x90) 15:09:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001200), 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = getpgid(0x0) getpgid(r2) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x9, 0x4, 0x1f, 0xfe, 0x0, 0x9, 0x200, 0xd, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x2001, 0x90, 0x10001, 0x9, 0xf93, 0xfff, 0x40, 0x0, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) r4 = mq_open(&(0x7f0000000080)='#\x00', 0x0, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000200)=""/4096, 0x1000, 0x0, &(0x7f0000001240)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x1c, 0x6, 0x9}, &(0x7f0000000080)) 15:09:04 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(0xffffffffffffffff, 0xc4c03d09, &(0x7f0000000080)={0x1540}) 15:09:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5, 0x2}}, 0x18) (rerun: 64) 15:09:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, r4}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111, 0x4}}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x1, 0x401, 0x5, 0x80, r0, 0x4e0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x18, r7, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r5, 0x4) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, r4}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111, 0x4}}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x1, 0x401, 0x5, 0x80, r0, 0x4e0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x5}, 0x48) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$TIPC_NL_BEARER_DISABLE(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x18, r7, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r5, 0x4) (async) 15:09:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5, 0x2}}, 0x18) 15:09:04 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) ioctl$PTP_SYS_OFFSET_EXTENDED(0xffffffffffffffff, 0xc4c03d09, &(0x7f0000000080)={0x1540}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) (async) ioctl$PTP_SYS_OFFSET_EXTENDED(0xffffffffffffffff, 0xc4c03d09, &(0x7f0000000080)={0x1540}) (async) 15:09:04 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x9d1040, 0x0) 15:09:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5, 0x2}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5, 0x2}}, 0x18) (async) 15:09:04 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x9d1040, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x9d1040, 0x0) (async) 15:09:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001200), 0x2, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = getpgid(0x0) getpgid(r2) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x9, 0x4, 0x1f, 0xfe, 0x0, 0x9, 0x200, 0xd, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x2001, 0x90, 0x10001, 0x9, 0xf93, 0xfff, 0x40, 0x0, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x8) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) (async) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) (async) r4 = mq_open(&(0x7f0000000080)='#\x00', 0x0, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000200)=""/4096, 0x1000, 0x0, &(0x7f0000001240)) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x1c, 0x6, 0x9}, &(0x7f0000000080)) 15:09:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x9, 0xfffffffa, 0x3000, 0x200, 0x1, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={&(0x7f0000000080)="6c243229df147cf3b53f2b73ddb5ca8ba57b1931669a80484a608b31f90c8733bd19592d54fb2065ecc11f40ef7a9137e8f50dbc8cc3b8354cbd0e8761e8c2636d1a9601d90e7d28b09351d2d6eecbb89e7b8f2c8ccfc27f8aa198d7b4dd17bdccf9572419cc5ce543ea229c5797eee1780e6089a27ac239ea226e7cb421c02fa42751d0effab03af5b99bad1bb1476a322db3cd5e9985cf59e89c47b022b752725e77755d5061ad433917c2f8863d24e048e07a6b790659e9d5e2837407f1f351397e3ecb", &(0x7f0000000300)=""/228, &(0x7f0000000000)="7864bd416eb8f4b74f9f8c8112a1fc616a79806bdb3d784128fe453dad1acc40f7b8e2187a6b098e25bc", &(0x7f0000000180)="7ba2cc31e973f52131362f06bafbc42223bd9744f785eab7700bc7b969d3c9bf660e3b5e7de1455b95c6878af6ad2d6ebecbe1a9f52d1fa1630c90dcf5de67cd5d5e20fd3dcec3ba0dd280036cb0523259", 0x20, r2, 0x4}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_TOL(r6, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x68, r5, 0x4, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x7ff, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4010) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000004c0)={0x4, 0x8, 0xfa00, {r8, 0x3ff}}, 0x10) 15:09:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000480)={0x15, 0x110, 0xfa00, {r1, 0x8, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x8000, @mcast2, 0x9fb}, @in={0x2, 0x4e23, @remote}}}, 0x118) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000440)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x5, @ipv4={'\x00', '\xff\xff', @loopback}, 0x800}, r4}}, 0x30) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in={0x2, 0x4e21, @multicast1}}}, 0x90) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_BIND(r9, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in={0x2, 0x4e20, @multicast2}}}, 0x90) 15:09:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5, 0x2}}, 0x18) 15:09:04 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x9d1040, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x9d1040, 0x0) (async) 15:09:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001200), 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = getpgid(0x0) getpgid(r2) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x9, 0x4, 0x1f, 0xfe, 0x0, 0x9, 0x200, 0xd, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x2001, 0x90, 0x10001, 0x9, 0xf93, 0xfff, 0x40, 0x0, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x8) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) r4 = mq_open(&(0x7f0000000080)='#\x00', 0x0, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000200)=""/4096, 0x1000, 0x0, &(0x7f0000001240)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x1c, 0x6, 0x9}, &(0x7f0000000080)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000001200), 0x2, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) getpgid(0x0) (async) getpgid(r2) (async) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x9, 0x4, 0x1f, 0xfe, 0x0, 0x9, 0x200, 0xd, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x2001, 0x90, 0x10001, 0x9, 0xf93, 0xfff, 0x40, 0x0, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x8) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r3) (async) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) (async) mq_open(&(0x7f0000000080)='#\x00', 0x0, 0x0, 0x0) (async) mq_timedreceive(r4, &(0x7f0000000200)=""/4096, 0x1000, 0x0, &(0x7f0000001240)) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) mq_getsetattr(r4, &(0x7f0000000000)={0x4, 0x1c, 0x6, 0x9}, &(0x7f0000000080)) (async) 15:09:04 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={&(0x7f0000000080)="b15429d9c41b9241e567c2973005e4b501666baa65b6ac219fc77de00218e9e1522a9bc66e26caace4ebcb8793351f60d3f49c19445b570e93eb0fda5ab406d9282e8d2e1181d654e95e07aad44466a7b8c405477020d81079", &(0x7f0000000100)=""/189, &(0x7f00000001c0)="58325dcdfb1fda8ba9830fe7c93998608826e50ff236c7821e10d523b22eb6df09f4d52406ef41349031d6c8990eebde61556a6db491288ae728ab92a399f78dd29a4e5f9881c392dfda8e464ba70af38c21d1f40e97ae8d0747d818238d89bc", &(0x7f0000000300)="1176a40884ffe29b41e3706215a7d11b84e3b91d658c929b88a2cf007655566b57b7ecf6fda96ca04c28c35fa5837a9eb3710b6d8249c9e1dbe2e6ff8df1f2ad81633f8f9e7ebceba471fa6caa7df01003ffced3d4d94f66e28101d1d9a496315d2d7284836fc8e066de3287a513d5e9fefa05597007c82194a09db72b897c028c8d45effc78cd0777aa6c9c646f72d351b50050bf50ad1fe0d1a16aa7956295fb74cf787237fc8fda627ed7d353e23b34ebf098813bccb13a3bf760df314e445d0d05e1464b158f58abd5e4d7dc2f46705f", 0x9, 0xffffffffffffffff, 0x27ee99316b4f5ec6}, 0x38) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0xffffffffffffffd1, 0xfa00, {&(0x7f0000000140), 0x4, {0xa, 0x4ea0, 0x80000000, @private1, 0x31}, r5}}, 0x38) 15:09:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x9, 0xfffffffa, 0x3000, 0x200, 0x1, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={&(0x7f0000000080)="6c243229df147cf3b53f2b73ddb5ca8ba57b1931669a80484a608b31f90c8733bd19592d54fb2065ecc11f40ef7a9137e8f50dbc8cc3b8354cbd0e8761e8c2636d1a9601d90e7d28b09351d2d6eecbb89e7b8f2c8ccfc27f8aa198d7b4dd17bdccf9572419cc5ce543ea229c5797eee1780e6089a27ac239ea226e7cb421c02fa42751d0effab03af5b99bad1bb1476a322db3cd5e9985cf59e89c47b022b752725e77755d5061ad433917c2f8863d24e048e07a6b790659e9d5e2837407f1f351397e3ecb", &(0x7f0000000300)=""/228, &(0x7f0000000000)="7864bd416eb8f4b74f9f8c8112a1fc616a79806bdb3d784128fe453dad1acc40f7b8e2187a6b098e25bc", &(0x7f0000000180)="7ba2cc31e973f52131362f06bafbc42223bd9744f785eab7700bc7b969d3c9bf660e3b5e7de1455b95c6878af6ad2d6ebecbe1a9f52d1fa1630c90dcf5de67cd5d5e20fd3dcec3ba0dd280036cb0523259", 0x20, r2, 0x4}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500), 0x13f}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0), 0xffffffffffffffff) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_TOL(r6, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x68, r5, 0x4, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x7ff, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4010) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000004c0)={0x4, 0x8, 0xfa00, {r8, 0x3ff}}, 0x10) 15:09:04 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={&(0x7f0000000080)="b15429d9c41b9241e567c2973005e4b501666baa65b6ac219fc77de00218e9e1522a9bc66e26caace4ebcb8793351f60d3f49c19445b570e93eb0fda5ab406d9282e8d2e1181d654e95e07aad44466a7b8c405477020d81079", &(0x7f0000000100)=""/189, &(0x7f00000001c0)="58325dcdfb1fda8ba9830fe7c93998608826e50ff236c7821e10d523b22eb6df09f4d52406ef41349031d6c8990eebde61556a6db491288ae728ab92a399f78dd29a4e5f9881c392dfda8e464ba70af38c21d1f40e97ae8d0747d818238d89bc", &(0x7f0000000300)="1176a40884ffe29b41e3706215a7d11b84e3b91d658c929b88a2cf007655566b57b7ecf6fda96ca04c28c35fa5837a9eb3710b6d8249c9e1dbe2e6ff8df1f2ad81633f8f9e7ebceba471fa6caa7df01003ffced3d4d94f66e28101d1d9a496315d2d7284836fc8e066de3287a513d5e9fefa05597007c82194a09db72b897c028c8d45effc78cd0777aa6c9c646f72d351b50050bf50ad1fe0d1a16aa7956295fb74cf787237fc8fda627ed7d353e23b34ebf098813bccb13a3bf760df314e445d0d05e1464b158f58abd5e4d7dc2f46705f", 0x9, 0xffffffffffffffff, 0x27ee99316b4f5ec6}, 0x38) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={&(0x7f0000000080)="b15429d9c41b9241e567c2973005e4b501666baa65b6ac219fc77de00218e9e1522a9bc66e26caace4ebcb8793351f60d3f49c19445b570e93eb0fda5ab406d9282e8d2e1181d654e95e07aad44466a7b8c405477020d81079", &(0x7f0000000100)=""/189, &(0x7f00000001c0)="58325dcdfb1fda8ba9830fe7c93998608826e50ff236c7821e10d523b22eb6df09f4d52406ef41349031d6c8990eebde61556a6db491288ae728ab92a399f78dd29a4e5f9881c392dfda8e464ba70af38c21d1f40e97ae8d0747d818238d89bc", &(0x7f0000000300)="1176a40884ffe29b41e3706215a7d11b84e3b91d658c929b88a2cf007655566b57b7ecf6fda96ca04c28c35fa5837a9eb3710b6d8249c9e1dbe2e6ff8df1f2ad81633f8f9e7ebceba471fa6caa7df01003ffced3d4d94f66e28101d1d9a496315d2d7284836fc8e066de3287a513d5e9fefa05597007c82194a09db72b897c028c8d45effc78cd0777aa6c9c646f72d351b50050bf50ad1fe0d1a16aa7956295fb74cf787237fc8fda627ed7d353e23b34ebf098813bccb13a3bf760df314e445d0d05e1464b158f58abd5e4d7dc2f46705f", 0x9, 0xffffffffffffffff, 0x27ee99316b4f5ec6}, 0x38) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5, 0x2}}, 0x18) 15:09:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair(0x2b, 0xa, 0x100, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r4, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x1b}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1000}, 0x4000000) 15:09:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x9, 0xfffffffa, 0x3000, 0x200, 0x1, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={&(0x7f0000000080)="6c243229df147cf3b53f2b73ddb5ca8ba57b1931669a80484a608b31f90c8733bd19592d54fb2065ecc11f40ef7a9137e8f50dbc8cc3b8354cbd0e8761e8c2636d1a9601d90e7d28b09351d2d6eecbb89e7b8f2c8ccfc27f8aa198d7b4dd17bdccf9572419cc5ce543ea229c5797eee1780e6089a27ac239ea226e7cb421c02fa42751d0effab03af5b99bad1bb1476a322db3cd5e9985cf59e89c47b022b752725e77755d5061ad433917c2f8863d24e048e07a6b790659e9d5e2837407f1f351397e3ecb", &(0x7f0000000300)=""/228, &(0x7f0000000000)="7864bd416eb8f4b74f9f8c8112a1fc616a79806bdb3d784128fe453dad1acc40f7b8e2187a6b098e25bc", &(0x7f0000000180)="7ba2cc31e973f52131362f06bafbc42223bd9744f785eab7700bc7b969d3c9bf660e3b5e7de1455b95c6878af6ad2d6ebecbe1a9f52d1fa1630c90dcf5de67cd5d5e20fd3dcec3ba0dd280036cb0523259", 0x20, r2, 0x4}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500), 0x13f}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_TOL(r6, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x68, r5, 0x4, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0x7ff, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x4010) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000004c0)={0x4, 0x8, 0xfa00, {r8, 0x3ff}}, 0x10) 15:09:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0xffffffffffffffd1, 0xfa00, {&(0x7f0000000140), 0x4, {0xa, 0x4ea0, 0x80000000, @private1, 0x31}, r5}}, 0x38) 15:09:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socketpair(0x2b, 0xa, 0x100, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r4, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x1b}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1000}, 0x4000000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) socketpair(0x2b, 0xa, 0x100, &(0x7f0000000000)) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r4, 0x19731f61430f9147}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x1b}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1000}, 0x4000000) (async) 15:09:04 executing program 0: bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={&(0x7f0000000080)="b15429d9c41b9241e567c2973005e4b501666baa65b6ac219fc77de00218e9e1522a9bc66e26caace4ebcb8793351f60d3f49c19445b570e93eb0fda5ab406d9282e8d2e1181d654e95e07aad44466a7b8c405477020d81079", &(0x7f0000000100)=""/189, &(0x7f00000001c0)="58325dcdfb1fda8ba9830fe7c93998608826e50ff236c7821e10d523b22eb6df09f4d52406ef41349031d6c8990eebde61556a6db491288ae728ab92a399f78dd29a4e5f9881c392dfda8e464ba70af38c21d1f40e97ae8d0747d818238d89bc", &(0x7f0000000300)="1176a40884ffe29b41e3706215a7d11b84e3b91d658c929b88a2cf007655566b57b7ecf6fda96ca04c28c35fa5837a9eb3710b6d8249c9e1dbe2e6ff8df1f2ad81633f8f9e7ebceba471fa6caa7df01003ffced3d4d94f66e28101d1d9a496315d2d7284836fc8e066de3287a513d5e9fefa05597007c82194a09db72b897c028c8d45effc78cd0777aa6c9c646f72d351b50050bf50ad1fe0d1a16aa7956295fb74cf787237fc8fda627ed7d353e23b34ebf098813bccb13a3bf760df314e445d0d05e1464b158f58abd5e4d7dc2f46705f", 0x9, 0xffffffffffffffff, 0x27ee99316b4f5ec6}, 0x38) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x6, 0xfff, "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", 0x1f, 0x7, 0x97, 0x52, 0x9, 0x80, 0x80}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 15:09:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) socketpair(0x2b, 0xa, 0x100, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r4, 0x19731f61430f9147}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x4}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x1b}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1000}, 0x4000000) 15:09:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private0, 0x3}, r1}}, 0x30) 15:09:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0xffffffffffffffd1, 0xfa00, {&(0x7f0000000140), 0x4, {0xa, 0x4ea0, 0x80000000, @private1, 0x31}, r5}}, 0x38) 15:09:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x6, 0xfff, "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", 0x1f, 0x7, 0x97, 0x52, 0x9, 0x80, 0x80}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x6, 0xfff, "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", 0x1f, 0x7, 0x97, 0x52, 0x9, 0x80, 0x80}}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) (async) 15:09:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private0, 0x3}, r1}}, 0x30) 15:09:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x1, 0x0, 0x7fffffff, 0x4, 0x8ee, 0x401, {0x4, 0x6, 0xa306, 0x20, 0x1, 0x8, 0x5, 0x8, 0x7, 0x8000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40}}}, 0x90) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f00000000c0)={0x0, 0x717c}) 15:09:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x6, 0xfff, "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", 0x1f, 0x7, 0x97, 0x52, 0x9, 0x80, 0x80}}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200), 0x111, 0x1}}, 0x20) 15:09:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0xfffbffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040804}, 0x8890) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x20, 0x0, [0xffffffff, 0x401, 0x400, 0x96, 0x1376b132, 0x3, 0x200, 0x101, 0x40, 0x7, 0x401, 0xffff8001, 0x8001, 0x401, 0x4, 0x1f]}], r5, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0xfffbffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040804}, 0x8890) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 15:09:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) 15:09:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) (async) write$FUSE_ENTRY(r0, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x1, 0x0, 0x7fffffff, 0x4, 0x8ee, 0x401, {0x4, 0x6, 0xa306, 0x20, 0x1, 0x8, 0x5, 0x8, 0x7, 0x8000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40}}}, 0x90) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) (async) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f00000000c0)={0x0, 0x717c}) 15:09:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0xfffbffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040804}, 0x8890) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:06 executing program 2: getgid() r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000000)={'erspan0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r3) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0x130, r4, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x108, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xb9a, @remote, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @private=0xa010101}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x9, @local, 0x7ff}}}}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'eth', 0x3a, 'batadv_slave_0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3ff, @rand_addr=' \x01\x00', 0x9}}}}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x48841}, 0x8000) 15:09:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r3}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0xfffbffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040804}, 0x8890) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) 15:09:06 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) (async) write$FUSE_ENTRY(r0, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x1, 0x0, 0x7fffffff, 0x4, 0x8ee, 0x401, {0x4, 0x6, 0xa306, 0x20, 0x1, 0x8, 0x5, 0x8, 0x7, 0x8000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40}}}, 0x90) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f00000000c0)={0x0, 0x717c}) 15:09:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x20, 0x0, [0xffffffff, 0x401, 0x400, 0x96, 0x1376b132, 0x3, 0x200, 0x101, 0x40, 0x7, 0x401, 0xffff8001, 0x8001, 0x401, 0x4, 0x1f]}], r5, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) 15:09:06 executing program 2: getgid() r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000000)={'erspan0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r3) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0x130, r4, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x108, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xb9a, @remote, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @private=0xa010101}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x9, @local, 0x7ff}}}}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'eth', 0x3a, 'batadv_slave_0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3ff, @rand_addr=' \x01\x00', 0x9}}}}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x48841}, 0x8000) getgid() (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x4) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000000)={'erspan0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r3) (async) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0x130, r4, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x108, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xb9a, @remote, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @private=0xa010101}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x9, @local, 0x7ff}}}}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'eth', 0x3a, 'batadv_slave_0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3ff, @rand_addr=' \x01\x00', 0x9}}}}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x48841}, 0x8000) (async) 15:09:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000300)="58ded0b8888ae929c272125c0ef8b2d8a7e9b693392cfbc29b052ff314e9f57bed6f6a47e910220e99c044f43487b696a984fb36e7bfab325c89ae1a247442a33f443016b362a7140a103fbbb540f3080ea509e50566628aed96e68333127e70c508bd50bec32ff5c0c6c581aba03aad862faa9b7f3a5887e022c06729a005ac3e67383c3331773512b3739d9e5b18c01991bd38d2b337c5c65082680c9e878252356295ac6ed17d6cfea0d94d9bf95ab0765d96b4f6a098dbd1b0bb6737fc02092c1583"}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x7, @remote, 0x4}, r3}}, 0x30) 15:09:06 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0xfffbffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040804}, 0x8890) 15:09:06 executing program 2: getgid() r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x4) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000000)={'erspan0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r3) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0x130, r4, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x108, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xb9a, @remote, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @private=0xa010101}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x9, @local, 0x7ff}}}}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'eth', 0x3a, 'batadv_slave_0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3ff, @rand_addr=' \x01\x00', 0x9}}}}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x48841}, 0x8000) getgid() (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x4}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @private=0xa010101}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x4) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000000)={'erspan0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r3) (async) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)={0x130, r4, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x108, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xb9a, @remote, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @private=0xa010101}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x9, @local, 0x7ff}}}}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'eth', 0x3a, 'batadv_slave_0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3ff, @rand_addr=' \x01\x00', 0x9}}}}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x48841}, 0x8000) (async) 15:09:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x20, 0x0, [0xffffffff, 0x401, 0x400, 0x96, 0x1376b132, 0x3, 0x200, 0x101, 0x40, 0x7, 0x401, 0xffff8001, 0x8001, 0x401, 0x4, 0x1f]}], r5, 0x1, 0x1, 0x48}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (rerun: 64) 15:09:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) 15:09:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x40, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0xfffffeec) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r4, 0x10, 0x0, @in6={0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7ff}}}, 0x90) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000700)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r8, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x354, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000480), 0x3, {0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, '\x00', 0x2}, 0x7}, r9}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000400), 0x2, 0x9}}, 0x20) 15:09:07 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, 0x0) 15:09:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000300)="58ded0b8888ae929c272125c0ef8b2d8a7e9b693392cfbc29b052ff314e9f57bed6f6a47e910220e99c044f43487b696a984fb36e7bfab325c89ae1a247442a33f443016b362a7140a103fbbb540f3080ea509e50566628aed96e68333127e70c508bd50bec32ff5c0c6c581aba03aad862faa9b7f3a5887e022c06729a005ac3e67383c3331773512b3739d9e5b18c01991bd38d2b337c5c65082680c9e878252356295ac6ed17d6cfea0d94d9bf95ab0765d96b4f6a098dbd1b0bb6737fc02092c1583"}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x7, @remote, 0x4}, r3}}, 0x30) 15:09:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) 15:09:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x27, 0x2, @thr={&(0x7f0000000140)="08ae4e78a6e6ead85dd1dfa68fd876d8899139e26484f0204cb8512afba3497c7afc749d8a7fbf8377d21a453f4c075721184aa6880e5429464586fdcf60d14bfbb59905f2148704e427f8e4f5ccf5def918739fca2d2b726d0f7aaf62de95e6d4516bced495fd019cbe17c8491c7a808d2c5f6637c0b94e6140d523f5ecfdb71e55d4354a96efc4deef459e3a585fc11022f63b8d77bb6a8a9c4810e13cb0adcdd63c54672b4d9b3cbf63de1df0940c78db8f361c406e36a8e27c7187401c8daceaca4d48dc63e89f41513c05cd3ac309a470ca0a87c72757da1ed3409e9b97223a523a310728bda2a979", &(0x7f0000000300)="aa671fa3de62cb49b7b89cd2d10e0ac2cb2fb6414ef045830fbc150711a387cc831d2262a68ebe5e49366c8c8c080ab089837d9ad1c903387331598531efae58e13807b0e181e90dacccbacab6c95f2b7be56cffa06a6aa421f71322bdac2519bd7eb7ea7f6952a2d41429d72a07abc01afec223db39e766f43d7a888f9f5301ec2e6a8ce8d6b27410e159224373f83ee855b5865865a1e58df43c7b822dd7e88193ae5a9d8c1185a5e550ea242dce8c22d4a615a3c488ef22673b99862a4ba63529b6"}}) 15:09:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r3, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x10, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x20040084) 15:09:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r3, 0x19731f61430f9147}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x10, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x20040084) 15:09:07 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) socket$inet_udplite(0x2, 0x2, 0x88) 15:09:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000300)="58ded0b8888ae929c272125c0ef8b2d8a7e9b693392cfbc29b052ff314e9f57bed6f6a47e910220e99c044f43487b696a984fb36e7bfab325c89ae1a247442a33f443016b362a7140a103fbbb540f3080ea509e50566628aed96e68333127e70c508bd50bec32ff5c0c6c581aba03aad862faa9b7f3a5887e022c06729a005ac3e67383c3331773512b3739d9e5b18c01991bd38d2b337c5c65082680c9e878252356295ac6ed17d6cfea0d94d9bf95ab0765d96b4f6a098dbd1b0bb6737fc02092c1583"}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x7, @remote, 0x4}, r3}}, 0x30) 15:09:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x27, 0x2, @thr={&(0x7f0000000140)="08ae4e78a6e6ead85dd1dfa68fd876d8899139e26484f0204cb8512afba3497c7afc749d8a7fbf8377d21a453f4c075721184aa6880e5429464586fdcf60d14bfbb59905f2148704e427f8e4f5ccf5def918739fca2d2b726d0f7aaf62de95e6d4516bced495fd019cbe17c8491c7a808d2c5f6637c0b94e6140d523f5ecfdb71e55d4354a96efc4deef459e3a585fc11022f63b8d77bb6a8a9c4810e13cb0adcdd63c54672b4d9b3cbf63de1df0940c78db8f361c406e36a8e27c7187401c8daceaca4d48dc63e89f41513c05cd3ac309a470ca0a87c72757da1ed3409e9b97223a523a310728bda2a979", &(0x7f0000000300)="aa671fa3de62cb49b7b89cd2d10e0ac2cb2fb6414ef045830fbc150711a387cc831d2262a68ebe5e49366c8c8c080ab089837d9ad1c903387331598531efae58e13807b0e181e90dacccbacab6c95f2b7be56cffa06a6aa421f71322bdac2519bd7eb7ea7f6952a2d41429d72a07abc01afec223db39e766f43d7a888f9f5301ec2e6a8ce8d6b27410e159224373f83ee855b5865865a1e58df43c7b822dd7e88193ae5a9d8c1185a5e550ea242dce8c22d4a615a3c488ef22673b99862a4ba63529b6"}}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)) (async) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x27, 0x2, @thr={&(0x7f0000000140)="08ae4e78a6e6ead85dd1dfa68fd876d8899139e26484f0204cb8512afba3497c7afc749d8a7fbf8377d21a453f4c075721184aa6880e5429464586fdcf60d14bfbb59905f2148704e427f8e4f5ccf5def918739fca2d2b726d0f7aaf62de95e6d4516bced495fd019cbe17c8491c7a808d2c5f6637c0b94e6140d523f5ecfdb71e55d4354a96efc4deef459e3a585fc11022f63b8d77bb6a8a9c4810e13cb0adcdd63c54672b4d9b3cbf63de1df0940c78db8f361c406e36a8e27c7187401c8daceaca4d48dc63e89f41513c05cd3ac309a470ca0a87c72757da1ed3409e9b97223a523a310728bda2a979", &(0x7f0000000300)="aa671fa3de62cb49b7b89cd2d10e0ac2cb2fb6414ef045830fbc150711a387cc831d2262a68ebe5e49366c8c8c080ab089837d9ad1c903387331598531efae58e13807b0e181e90dacccbacab6c95f2b7be56cffa06a6aa421f71322bdac2519bd7eb7ea7f6952a2d41429d72a07abc01afec223db39e766f43d7a888f9f5301ec2e6a8ce8d6b27410e159224373f83ee855b5865865a1e58df43c7b822dd7e88193ae5a9d8c1185a5e550ea242dce8c22d4a615a3c488ef22673b99862a4ba63529b6"}}) (async) 15:09:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) 15:09:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r3, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x10, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x20040084) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r3, 0x19731f61430f9147}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x10, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x20040084) (async) 15:09:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x40, "d66882", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0xfffffeec) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r4, 0x10, 0x0, @in6={0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7ff}}}, 0x90) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000700)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r8, 0x1}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x354, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000480), 0x3, {0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, '\x00', 0x2}, 0x7}, r9}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000400), 0x2, 0x9}}, 0x20) 15:09:07 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) 15:09:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0x6}}, 0x20) 15:09:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)) (async) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x27, 0x2, @thr={&(0x7f0000000140)="08ae4e78a6e6ead85dd1dfa68fd876d8899139e26484f0204cb8512afba3497c7afc749d8a7fbf8377d21a453f4c075721184aa6880e5429464586fdcf60d14bfbb59905f2148704e427f8e4f5ccf5def918739fca2d2b726d0f7aaf62de95e6d4516bced495fd019cbe17c8491c7a808d2c5f6637c0b94e6140d523f5ecfdb71e55d4354a96efc4deef459e3a585fc11022f63b8d77bb6a8a9c4810e13cb0adcdd63c54672b4d9b3cbf63de1df0940c78db8f361c406e36a8e27c7187401c8daceaca4d48dc63e89f41513c05cd3ac309a470ca0a87c72757da1ed3409e9b97223a523a310728bda2a979", &(0x7f0000000300)="aa671fa3de62cb49b7b89cd2d10e0ac2cb2fb6414ef045830fbc150711a387cc831d2262a68ebe5e49366c8c8c080ab089837d9ad1c903387331598531efae58e13807b0e181e90dacccbacab6c95f2b7be56cffa06a6aa421f71322bdac2519bd7eb7ea7f6952a2d41429d72a07abc01afec223db39e766f43d7a888f9f5301ec2e6a8ce8d6b27410e159224373f83ee855b5865865a1e58df43c7b822dd7e88193ae5a9d8c1185a5e550ea242dce8c22d4a615a3c488ef22673b99862a4ba63529b6"}}) 15:09:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x5}}, 0x10) 15:09:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) 15:09:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x5}}, 0x10) 15:09:07 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 15:09:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0x6}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0x6}}, 0x20) (async) 15:09:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 15:09:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x5}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x0, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x5}}, 0x10) (async) 15:09:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x40, "d66882", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0xfffffeec) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r4, 0x10, 0x0, @in6={0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7ff}}}, 0x90) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000700)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r8, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x354, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000480), 0x3, {0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, '\x00', 0x2}, 0x7}, r9}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000400), 0x2, 0x9}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2, 0x6}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x40, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x0, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0xfffffeec) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000340)={0x14, 0x88, 0xfa00, {r4, 0x10, 0x0, @in6={0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7ff}}}, 0x90) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000700)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r8, 0x1}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740), 0x354, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000480), 0x3, {0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, '\x00', 0x2}, 0x7}, r9}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000400), 0x2, 0x9}}, 0x20) (async) 15:09:07 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 15:09:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x106, 0x6}}, 0x20) 15:09:07 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x8084) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:08 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)=0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000100)={0x90, 0x0, r1, {0x0, 0x1, 0x10001, 0x80, 0xcf9e, 0x1000, {0x5, 0x4, 0xfffffffffffffffb, 0x9, 0x8, 0x8, 0xfffffffb, 0x6fad, 0x0, 0x4000, 0x1af, 0x0, r2, 0x3, 0x6}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) syz_open_dev$media(&(0x7f0000000240), 0xffffffffffff865f, 0x101140) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 15:09:08 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x9}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x3, 0xfa00, {r4}}, 0x10) 15:09:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:08 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:08 executing program 2: ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000c40)={{0x81, 0xdee}, {0x80, 0x9}, 0x9, 0x1}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), r2) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000000980)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, r3, 0x4, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x72}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x24004840) sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f00000005c0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000740)=ANY=[@ANYRES64=r1, @ANYRES16=r1, @ANYBLOB="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"], 0x208}}, 0x20000054) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x28, 0x0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x24040000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000c80)={0x1a4, r5, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_SOCK={0x9c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xed}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb9}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x28c}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1b1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x12}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd8, r6, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xa4c}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x64010102}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x42}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0xd8}, 0x1, 0x0, 0x0, 0x20040014}, 0x280d5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), r1) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r8, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r7}}, 0x10) 15:09:08 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) (async) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)=0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000100)={0x90, 0x0, r1, {0x0, 0x1, 0x10001, 0x80, 0xcf9e, 0x1000, {0x5, 0x4, 0xfffffffffffffffb, 0x9, 0x8, 0x8, 0xfffffffb, 0x6fad, 0x0, 0x4000, 0x1af, 0x0, r2, 0x3, 0x6}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) syz_open_dev$media(&(0x7f0000000240), 0xffffffffffff865f, 0x101140) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 15:09:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x9}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x3, 0xfa00, {r4}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x9}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x3, 0xfa00, {r4}}, 0x10) (async) 15:09:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:08 executing program 2: ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000c40)={{0x81, 0xdee}, {0x80, 0x9}, 0x9, 0x1}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), r2) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000000980)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, r3, 0x4, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x72}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x24004840) sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f00000005c0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000740)=ANY=[@ANYRES64=r1, @ANYRES16=r1, @ANYBLOB="040026bd7000fddbdf2518000000c000068008000100020000000800010007000000060003007e5a0000a300030037e48eb616937788208bcf5227b6309bcd6476e6323835bda6402d74eb055f3f05f8d0149a91e1807a764319b737069ddbed69102a8d04b4b96565ba42020f9fac7e3eeef49b51f317494632c4f37fe281371157042033363fec6907e7ade07921c5e04d262b41b1f96a15aa58dcae97fe12366346b265e8673bd93e11babb1aeed973273752cf95add0162c1722181b2952329c469367883d98282af1d35b00a80005802400028008000400ffffffff08000200080000000800040003000000080001000d0000002c0002800800040006000000080001001a0000000800030000010000080001001400000008000100070000001c00028008000300080000000800020001000000080004000200000014000280080001001200000008000400ff01000008000100657468000c0002800800030008000000070001006962000008000100657468005c000280040004000800010000000000340003800800020004000000080001000800000008000200010000000800020001040000080001000900000008000200040000000400040008000100ff0100000400040008000100060000000400098028000280080002006f0000001c00038008000200050000000800010009000000080001008d4b000004000680"], 0x208}}, 0x20000054) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x28, 0x0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x24040000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000c80)={0x1a4, r5, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_SOCK={0x9c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xed}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb9}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x28c}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1b1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x12}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd8, r6, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xa4c}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x64010102}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x42}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0xd8}, 0x1, 0x0, 0x0, 0x20040014}, 0x280d5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), r1) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r8, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r7}}, 0x10) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000c40)={{0x81, 0xdee}, {0x80, 0x9}, 0x9, 0x1}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), r2) (async) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000000980)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, r3, 0x4, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x72}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x24004840) (async) sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f00000005c0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000740)=ANY=[@ANYRES64=r1, @ANYRES16=r1, @ANYBLOB="040026bd7000fddbdf2518000000c000068008000100020000000800010007000000060003007e5a0000a300030037e48eb616937788208bcf5227b6309bcd6476e6323835bda6402d74eb055f3f05f8d0149a91e1807a764319b737069ddbed69102a8d04b4b96565ba42020f9fac7e3eeef49b51f317494632c4f37fe281371157042033363fec6907e7ade07921c5e04d262b41b1f96a15aa58dcae97fe12366346b265e8673bd93e11babb1aeed973273752cf95add0162c1722181b2952329c469367883d98282af1d35b00a80005802400028008000400ffffffff08000200080000000800040003000000080001000d0000002c0002800800040006000000080001001a0000000800030000010000080001001400000008000100070000001c00028008000300080000000800020001000000080004000200000014000280080001001200000008000400ff01000008000100657468000c0002800800030008000000070001006962000008000100657468005c000280040004000800010000000000340003800800020004000000080001000800000008000200010000000800020001040000080001000900000008000200040000000400040008000100ff0100000400040008000100060000000400098028000280080002006f0000001c00038008000200050000000800010009000000080001008d4b000004000680"], 0x208}}, 0x20000054) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) (async) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x28, 0x0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x24040000) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) (async) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000c80)={0x1a4, r5, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_SOCK={0x9c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xed}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb9}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x28c}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1b1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x12}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd8, r6, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xa4c}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x64010102}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x42}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0xd8}, 0x1, 0x0, 0x0, 0x20040014}, 0x280d5) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), r1) (async) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r8, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r7}}, 0x10) (async) 15:09:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:08 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)=0x0) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000100)={0x90, 0x0, r1, {0x0, 0x1, 0x10001, 0x80, 0xcf9e, 0x1000, {0x5, 0x4, 0xfffffffffffffffb, 0x9, 0x8, 0x8, 0xfffffffb, 0x6fad, 0x0, 0x4000, 0x1af, 0x0, r2, 0x3, 0x6}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) syz_open_dev$media(&(0x7f0000000240), 0xffffffffffff865f, 0x101140) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000380)={0x2020}, 0x2020) (async) write$FUSE_LK(r0, &(0x7f00000023c0)={0x28, 0x0, r1}, 0x28) (async) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) (async) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000100)={0x90, 0x0, r1, {0x0, 0x1, 0x10001, 0x80, 0xcf9e, 0x1000, {0x5, 0x4, 0xfffffffffffffffb, 0x9, 0x8, 0x8, 0xfffffffb, 0x6fad, 0x0, 0x4000, 0x1af, 0x0, r2, 0x3, 0x6}}}, 0x90) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200), 0x2, 0x2}}, 0x20) (async) syz_open_dev$media(&(0x7f0000000240), 0xffffffffffff865f, 0x101140) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) (async) 15:09:08 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:08 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x9}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x3, 0xfa00, {r4}}, 0x10) 15:09:08 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:08 executing program 2: ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000c40)={{0x81, 0xdee}, {0x80, 0x9}, 0x9, 0x1}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), r2) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000000980)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, r3, 0x4, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x72}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x24004840) sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f00000005c0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000740)=ANY=[@ANYRES64=r1, @ANYRES16=r1, @ANYBLOB="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"], 0x208}}, 0x20000054) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x28, 0x0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x24040000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000c80)={0x1a4, r5, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_SOCK={0x9c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xed}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb9}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x28c}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1b1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x12}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd8, r6, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xa4c}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x64010102}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x42}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0xd8}, 0x1, 0x0, 0x0, 0x20040014}, 0x280d5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), r1) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r8, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r7}}, 0x10) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000c40)={{0x81, 0xdee}, {0x80, 0x9}, 0x9, 0x1}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), r2) (async) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000000980)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, r3, 0x4, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x72}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x24004840) (async) sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f00000005c0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000740)=ANY=[@ANYRES64=r1, @ANYRES16=r1, @ANYBLOB="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"], 0x208}}, 0x20000054) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) (async) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x28, 0x0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x24040000) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) (async) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000c80)={0x1a4, r5, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_SOCK={0x9c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xed}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb9}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x28c}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1b1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x12}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd8, r6, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xa4c}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x64010102}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x42}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0xd8}, 0x1, 0x0, 0x0, 0x20040014}, 0x280d5) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), r1) (async) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r8, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r7}}, 0x10) (async) 15:09:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1a, 0x80000000, 0x7, 0x5, 0xa06, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0x7, 0x4, 0xb, 0x18, 0x4}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @generic={0x4, 0x0, 0x7, 0x2, 0xfff}]}, &(0x7f0000000100)='GPL\x00', 0x6d, 0xd, &(0x7f0000000140)=""/13, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x0, 0x5, 0x2a6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r2, 0xffffffffffffffff]}, 0x80) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x0) 15:09:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111}}, 0x20) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x381802, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x2, r5, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3d36}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) 15:09:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x0) 15:09:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1a, 0x80000000, 0x7, 0x5, 0xa06, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0x7, 0x4, 0xb, 0x18, 0x4}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @generic={0x4, 0x0, 0x7, 0x2, 0xfff}]}, &(0x7f0000000100)='GPL\x00', 0x6d, 0xd, &(0x7f0000000140)=""/13, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x0, 0x5, 0x2a6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r2, 0xffffffffffffffff]}, 0x80) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1a, 0x80000000, 0x7, 0x5, 0xa06, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0x7, 0x4, 0xb, 0x18, 0x4}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @generic={0x4, 0x0, 0x7, 0x2, 0xfff}]}, &(0x7f0000000100)='GPL\x00', 0x6d, 0xd, &(0x7f0000000140)=""/13, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x0, 0x5, 0x2a6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r2, 0xffffffffffffffff]}, 0x80) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:08 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x6}}, 0x10) 15:09:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000480)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x7, @private1, 0x9}, r3}}, 0x30) 15:09:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, 0x0, 0x0) 15:09:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111}}, 0x20) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x381802, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x2, r5, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3d36}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x13f, 0x5}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x111}}, 0x20) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x381802, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x2, r5, 0x0, 0x0, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3d36}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) (async) 15:09:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)={0x34, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}]}, 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)={0x34, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}]}, 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:08 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x6}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x6}}, 0x10) (async) 15:09:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1a, 0x80000000, 0x7, 0x5, 0xa06, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5}, [@exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0x7, 0x4, 0xb, 0x18, 0x4}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x6}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @generic={0x4, 0x0, 0x7, 0x2, 0xfff}]}, &(0x7f0000000100)='GPL\x00', 0x6d, 0xd, &(0x7f0000000140)=""/13, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x0, 0x5, 0x2a6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[r2, 0xffffffffffffffff]}, 0x80) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)={0x34, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x401}]}, 0x34}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xcb3, @private1={0xfc, 0x1, '\x00', 0x1}, 0xff}, r8}}, 0x30) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r9, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3bc, @remote, 0xfc5}, r10}}, 0x30) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000300)=[{0x1a, 0x0, [0x88, 0xfffffffc, 0x1, 0x0, 0x2, 0xf4, 0xffffffff, 0xffffff7c, 0xc2, 0x9, 0xb7, 0x2, 0x3, 0x40, 0x6, 0xffffffff]}, {0x38, 0x0, [0x5, 0x8673, 0x10001, 0x7, 0xffff, 0x1, 0x5, 0x400, 0x10000, 0x7, 0x81, 0x1, 0x7, 0x2, 0xfffeffff, 0xe891]}, {0x4, 0x0, [0xa2cd, 0x80000000, 0x5, 0x3, 0xdc, 0x5, 0x3f, 0x2, 0x5, 0x1, 0x3f, 0x9, 0x2f, 0x20, 0x31e40000, 0x7]}, {0x1a, 0x0, [0x6, 0x5c, 0x10000, 0x71, 0x6, 0x7, 0x5, 0x4, 0xfffffffd, 0x2, 0x9, 0x4, 0x5, 0x6, 0x7c0b, 0xffffffff]}, {0x8, 0x0, [0xffff, 0x40, 0x1ff, 0x9, 0x0, 0x401, 0x3ff, 0x80000001, 0x4, 0x6, 0x1000, 0x7, 0x3, 0x10001, 0x4, 0x9]}, {0x1, 0x0, [0x2, 0x8, 0xff8a, 0x795498cd, 0x80000000, 0x6, 0x400, 0x8000, 0x6, 0x5, 0x0, 0x4, 0x1, 0x9, 0x0, 0x8]}, {0x4, 0x0, [0x1, 0xfff, 0x9, 0xa28, 0x6, 0x7, 0x6, 0x4, 0x2, 0x217, 0x10000, 0x6, 0x80000001, 0x1, 0x3f, 0x1cff]}, {0x4, 0x0, [0xffffffff, 0x6, 0x20e24af4, 0x1000, 0xfff, 0x1f, 0x80000000, 0x0, 0x7fff, 0x2, 0x2, 0x8, 0x40, 0xa0c, 0x6e71]}], r4, 0x1, 0x1, 0x240}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000580)={0x7, 0x8, 0xfa00, {r11, 0x801}}, 0x10) 15:09:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000480)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x7, @private1, 0x9}, r3}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x2, 0x6}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000480)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x7, @private1, 0x9}, r3}}, 0x30) (async) 15:09:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:09 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 15:09:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111}}, 0x20) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x381802, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x2, r5, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3d36}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x13f, 0x5}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x111}}, 0x20) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200), 0x381802, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000140)=0x2, r5, 0x0, 0x0, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3d36}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) (async) 15:09:09 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x6}}, 0x10) 15:09:09 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 15:09:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:09 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 15:09:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xcb3, @private1={0xfc, 0x1, '\x00', 0x1}, 0xff}, r8}}, 0x30) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r9, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3bc, @remote, 0xfc5}, r10}}, 0x30) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000300)=[{0x1a, 0x0, [0x88, 0xfffffffc, 0x1, 0x0, 0x2, 0xf4, 0xffffffff, 0xffffff7c, 0xc2, 0x9, 0xb7, 0x2, 0x3, 0x40, 0x6, 0xffffffff]}, {0x38, 0x0, [0x5, 0x8673, 0x10001, 0x7, 0xffff, 0x1, 0x5, 0x400, 0x10000, 0x7, 0x81, 0x1, 0x7, 0x2, 0xfffeffff, 0xe891]}, {0x4, 0x0, [0xa2cd, 0x80000000, 0x5, 0x3, 0xdc, 0x5, 0x3f, 0x2, 0x5, 0x1, 0x3f, 0x9, 0x2f, 0x20, 0x31e40000, 0x7]}, {0x1a, 0x0, [0x6, 0x5c, 0x10000, 0x71, 0x6, 0x7, 0x5, 0x4, 0xfffffffd, 0x2, 0x9, 0x4, 0x5, 0x6, 0x7c0b, 0xffffffff]}, {0x8, 0x0, [0xffff, 0x40, 0x1ff, 0x9, 0x0, 0x401, 0x3ff, 0x80000001, 0x4, 0x6, 0x1000, 0x7, 0x3, 0x10001, 0x4, 0x9]}, {0x1, 0x0, [0x2, 0x8, 0xff8a, 0x795498cd, 0x80000000, 0x6, 0x400, 0x8000, 0x6, 0x5, 0x0, 0x4, 0x1, 0x9, 0x0, 0x8]}, {0x4, 0x0, [0x1, 0xfff, 0x9, 0xa28, 0x6, 0x7, 0x6, 0x4, 0x2, 0x217, 0x10000, 0x6, 0x80000001, 0x1, 0x3f, 0x1cff]}, {0x4, 0x0, [0xffffffff, 0x6, 0x20e24af4, 0x1000, 0xfff, 0x1f, 0x80000000, 0x0, 0x7fff, 0x2, 0x2, 0x8, 0x40, 0xa0c, 0x6e71]}], r4, 0x1, 0x1, 0x240}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000580)={0x7, 0x8, 0xfa00, {r11, 0x801}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xcb3, @private1={0xfc, 0x1, '\x00', 0x1}, 0xff}, r8}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x111, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r9, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3bc, @remote, 0xfc5}, r10}}, 0x30) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000300)=[{0x1a, 0x0, [0x88, 0xfffffffc, 0x1, 0x0, 0x2, 0xf4, 0xffffffff, 0xffffff7c, 0xc2, 0x9, 0xb7, 0x2, 0x3, 0x40, 0x6, 0xffffffff]}, {0x38, 0x0, [0x5, 0x8673, 0x10001, 0x7, 0xffff, 0x1, 0x5, 0x400, 0x10000, 0x7, 0x81, 0x1, 0x7, 0x2, 0xfffeffff, 0xe891]}, {0x4, 0x0, [0xa2cd, 0x80000000, 0x5, 0x3, 0xdc, 0x5, 0x3f, 0x2, 0x5, 0x1, 0x3f, 0x9, 0x2f, 0x20, 0x31e40000, 0x7]}, {0x1a, 0x0, [0x6, 0x5c, 0x10000, 0x71, 0x6, 0x7, 0x5, 0x4, 0xfffffffd, 0x2, 0x9, 0x4, 0x5, 0x6, 0x7c0b, 0xffffffff]}, {0x8, 0x0, [0xffff, 0x40, 0x1ff, 0x9, 0x0, 0x401, 0x3ff, 0x80000001, 0x4, 0x6, 0x1000, 0x7, 0x3, 0x10001, 0x4, 0x9]}, {0x1, 0x0, [0x2, 0x8, 0xff8a, 0x795498cd, 0x80000000, 0x6, 0x400, 0x8000, 0x6, 0x5, 0x0, 0x4, 0x1, 0x9, 0x0, 0x8]}, {0x4, 0x0, [0x1, 0xfff, 0x9, 0xa28, 0x6, 0x7, 0x6, 0x4, 0x2, 0x217, 0x10000, 0x6, 0x80000001, 0x1, 0x3f, 0x1cff]}, {0x4, 0x0, [0xffffffff, 0x6, 0x20e24af4, 0x1000, 0xfff, 0x1f, 0x80000000, 0x0, 0x7fff, 0x2, 0x2, 0x8, 0x40, 0xa0c, 0x6e71]}], r4, 0x1, 0x1, 0x240}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x106, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000580)={0x7, 0x8, 0xfa00, {r11, 0x801}}, 0x10) (async) 15:09:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={0x0}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000480)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x7, @private1, 0x9}, r3}}, 0x30) 15:09:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="0200000000000000000006000000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x8, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x10) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) syz_open_dev$dri(&(0x7f00000001c0), 0x5, 0x404200) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, {0xa, 0x4e20, 0xfffffffb, @mcast2, 0x81}, r7, 0x2}}, 0x48) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000047c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r8, &(0x7f0000000300)={0x158, 0x0, 0x0, [{{0x3, 0x3, 0x70, 0x0, 0x1fff, 0x3, {0x3, 0x400, 0x7f, 0x1, 0xe00000000, 0x1000, 0x40c06c74, 0x2, 0x7, 0x4000, 0x8, r9, 0xffffffffffffffff, 0x61b, 0xffffff00}}, {0x0, 0x2, 0x6, 0xffffffff, '/;:*@&'}}, {{0x4, 0x2, 0x100000001, 0x40, 0xffffffff, 0x3dd, {0x0, 0x5, 0x10000, 0x5, 0x3, 0x6, 0x6, 0x7, 0x1, 0x1000, 0x5, r10, 0xee00, 0x8, 0x863f}}, {0x3, 0x8000, 0xf, 0x4, '/dev/dri/card#\x00'}}]}, 0x158) 15:09:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={0x0}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async, rerun: 32) r2 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) (rerun: 64) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="0200000000000000000006000000"], 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x8, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x10) (async, rerun: 64) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) (async, rerun: 64) syz_open_dev$dri(&(0x7f00000001c0), 0x5, 0x404200) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, {0xa, 0x4e20, 0xfffffffb, @mcast2, 0x81}, r7, 0x2}}, 0x48) (async) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f00000047c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (rerun: 32) write$FUSE_DIRENTPLUS(r8, &(0x7f0000000300)={0x158, 0x0, 0x0, [{{0x3, 0x3, 0x70, 0x0, 0x1fff, 0x3, {0x3, 0x400, 0x7f, 0x1, 0xe00000000, 0x1000, 0x40c06c74, 0x2, 0x7, 0x4000, 0x8, r9, 0xffffffffffffffff, 0x61b, 0xffffff00}}, {0x0, 0x2, 0x6, 0xffffffff, '/;:*@&'}}, {{0x4, 0x2, 0x100000001, 0x40, 0xffffffff, 0x3dd, {0x0, 0x5, 0x10000, 0x5, 0x3, 0x6, 0x6, 0x7, 0x1, 0x1000, 0x5, r10, 0xee00, 0x8, 0x863f}}, {0x3, 0x8000, 0xf, 0x4, '/dev/dri/card#\x00'}}]}, 0x158) 15:09:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xcb3, @private1={0xfc, 0x1, '\x00', 0x1}, 0xff}, r8}}, 0x30) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r9, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3bc, @remote, 0xfc5}, r10}}, 0x30) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000300)=[{0x1a, 0x0, [0x88, 0xfffffffc, 0x1, 0x0, 0x2, 0xf4, 0xffffffff, 0xffffff7c, 0xc2, 0x9, 0xb7, 0x2, 0x3, 0x40, 0x6, 0xffffffff]}, {0x38, 0x0, [0x5, 0x8673, 0x10001, 0x7, 0xffff, 0x1, 0x5, 0x400, 0x10000, 0x7, 0x81, 0x1, 0x7, 0x2, 0xfffeffff, 0xe891]}, {0x4, 0x0, [0xa2cd, 0x80000000, 0x5, 0x3, 0xdc, 0x5, 0x3f, 0x2, 0x5, 0x1, 0x3f, 0x9, 0x2f, 0x20, 0x31e40000, 0x7]}, {0x1a, 0x0, [0x6, 0x5c, 0x10000, 0x71, 0x6, 0x7, 0x5, 0x4, 0xfffffffd, 0x2, 0x9, 0x4, 0x5, 0x6, 0x7c0b, 0xffffffff]}, {0x8, 0x0, [0xffff, 0x40, 0x1ff, 0x9, 0x0, 0x401, 0x3ff, 0x80000001, 0x4, 0x6, 0x1000, 0x7, 0x3, 0x10001, 0x4, 0x9]}, {0x1, 0x0, [0x2, 0x8, 0xff8a, 0x795498cd, 0x80000000, 0x6, 0x400, 0x8000, 0x6, 0x5, 0x0, 0x4, 0x1, 0x9, 0x0, 0x8]}, {0x4, 0x0, [0x1, 0xfff, 0x9, 0xa28, 0x6, 0x7, 0x6, 0x4, 0x2, 0x217, 0x10000, 0x6, 0x80000001, 0x1, 0x3f, 0x1cff]}, {0x4, 0x0, [0xffffffff, 0x6, 0x20e24af4, 0x1000, 0xfff, 0x1f, 0x80000000, 0x0, 0x7fff, 0x2, 0x2, 0x8, 0x40, 0xa0c, 0x6e71]}], r4, 0x1, 0x1, 0x240}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000580)={0x7, 0x8, 0xfa00, {r11, 0x801}}, 0x10) 15:09:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={0x0}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x13f, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:10 executing program 3: socket$pptp(0x18, 0x1, 0x2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e21, 0x800, @local, 0xbd}, r1}}, 0x38) 15:09:10 executing program 0: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000140)={0x3}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000180)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ptrace$poke(0x4, 0xffffffffffffffff, &(0x7f00000001c0), 0x1) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x27}}}}, [@NL80211_ATTR_KEY_IDX={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 15:09:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:10 executing program 3: socket$pptp(0x18, 0x1, 0x2) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e21, 0x800, @local, 0xbd}, r1}}, 0x38) 15:09:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="0200000000000000000006000000"], 0x14}}, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x8, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x10) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) syz_open_dev$dri(&(0x7f00000001c0), 0x5, 0x404200) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, {0xa, 0x4e20, 0xfffffffb, @mcast2, 0x81}, r7, 0x2}}, 0x48) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000047c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r8, &(0x7f0000000300)={0x158, 0x0, 0x0, [{{0x3, 0x3, 0x70, 0x0, 0x1fff, 0x3, {0x3, 0x400, 0x7f, 0x1, 0xe00000000, 0x1000, 0x40c06c74, 0x2, 0x7, 0x4000, 0x8, r9, 0xffffffffffffffff, 0x61b, 0xffffff00}}, {0x0, 0x2, 0x6, 0xffffffff, '/;:*@&'}}, {{0x4, 0x2, 0x100000001, 0x40, 0xffffffff, 0x3dd, {0x0, 0x5, 0x10000, 0x5, 0x3, 0x6, 0x6, 0x7, 0x1, 0x1000, 0x5, r10, 0xee00, 0x8, 0x863f}}, {0x3, 0x8000, 0xf, 0x4, '/dev/dri/card#\x00'}}]}, 0x158) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="0200000000000000000006000000"], 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x8, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) (async) syz_open_dev$dri(&(0x7f00000001c0), 0x5, 0x404200) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}, {0xa, 0x4e20, 0xfffffffb, @mcast2, 0x81}, r7, 0x2}}, 0x48) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000047c0)={0x2020}, 0x2020) (async) write$FUSE_DIRENTPLUS(r8, &(0x7f0000000300)={0x158, 0x0, 0x0, [{{0x3, 0x3, 0x70, 0x0, 0x1fff, 0x3, {0x3, 0x400, 0x7f, 0x1, 0xe00000000, 0x1000, 0x40c06c74, 0x2, 0x7, 0x4000, 0x8, r9, 0xffffffffffffffff, 0x61b, 0xffffff00}}, {0x0, 0x2, 0x6, 0xffffffff, '/;:*@&'}}, {{0x4, 0x2, 0x100000001, 0x40, 0xffffffff, 0x3dd, {0x0, 0x5, 0x10000, 0x5, 0x3, 0x6, 0x6, 0x7, 0x1, 0x1000, 0x5, r10, 0xee00, 0x8, 0x863f}}, {0x3, 0x8000, 0xf, 0x4, '/dev/dri/card#\x00'}}]}, 0x158) (async) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_MTU={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:11 executing program 0: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000140)={0x3}) (async) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000180)) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ptrace$poke(0x4, 0xffffffffffffffff, &(0x7f00000001c0), 0x1) (async) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x27}}}}, [@NL80211_ATTR_KEY_IDX={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 15:09:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_MTU={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_MTU={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 0: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000140)={0x3}) (async, rerun: 32) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000180)) (async, rerun: 32) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ptrace$poke(0x4, 0xffffffffffffffff, &(0x7f00000001c0), 0x1) (async) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x27}}}}, [@NL80211_ATTR_KEY_IDX={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 5: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0x1, &(0x7f0000000000)="3f6f691847de5bc330398367077b33af8ca95ffaa4436d1fdca873f86883629566ffc391eda38b7751d97e7d2936", &(0x7f0000000080)=""/247}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1}, @in6={0xa, 0x4e23, 0x1, @local, 0x8001}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r3, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) openat$cgroup_pressure(r3, &(0x7f0000000680)='cpu.pressure\x00', 0x2, 0x0) r4 = mq_open(&(0x7f0000000640)='\x00', 0x80, 0x0, &(0x7f0000000600)={0x369, 0xfffffffffffffff6, 0x1003, 0x9}) mq_notify(r4, &(0x7f0000000440)={0x0, 0x13, 0x4, @thr={&(0x7f0000000300)="1abc9f1589b51564e03bb3097713b138b098ee32ec799b64c99cea2b40acbe97496cb6bac7f6513e60d39db8eb02aea13bd7da26bd8fb7dfeba1eb380adf89d685cdc05a8cc510a5a067155a723292ad5e04f740406290ad2e76678ca9bd9bbcc347", &(0x7f0000000380)="9bdb3de23c3ce91fe0b6c0e79ec870153eace97dc48b25b2f4e85c90d75c7cb129b3009b99bc94829cad6c756926f5648abfab706b586b21c4834d6125eb51be6cfe952813cafcd916d1127e4ee9fb6bc065e12fcae6c46104e6399b9937055e6ebde36ec800f84a81d130153d4b50c435ac056dff268b255288ac67007abbc57f694be1eb8931abb83e74b197ee44791dee9405e9ee784dbaa5d7dd8be2c6cf07dd2ff590d27870d792700f192ed68165"}}) syz_genetlink_get_family_id$fou(&(0x7f0000000480), 0xffffffffffffffff) 15:09:11 executing program 3: socket$pptp(0x18, 0x1, 0x2) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x2, {0xa, 0x4e21, 0x800, @local, 0xbd}, r1}}, 0x38) 15:09:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000300)={0x1, 0x10, 0xfa00, {&(0x7f00000002c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x20, 0x400, @mcast2, 0x4}, r7}}, 0x30) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x1}}, 0x20) 15:09:11 executing program 5: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0x1, &(0x7f0000000000)="3f6f691847de5bc330398367077b33af8ca95ffaa4436d1fdca873f86883629566ffc391eda38b7751d97e7d2936", &(0x7f0000000080)=""/247}, 0x20) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1}, @in6={0xa, 0x4e23, 0x1, @local, 0x8001}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) (async, rerun: 32) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) (rerun: 32) openat$cgroup_devices(r3, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) (async) openat$cgroup_pressure(r3, &(0x7f0000000680)='cpu.pressure\x00', 0x2, 0x0) (async) r4 = mq_open(&(0x7f0000000640)='\x00', 0x80, 0x0, &(0x7f0000000600)={0x369, 0xfffffffffffffff6, 0x1003, 0x9}) mq_notify(r4, &(0x7f0000000440)={0x0, 0x13, 0x4, @thr={&(0x7f0000000300)="1abc9f1589b51564e03bb3097713b138b098ee32ec799b64c99cea2b40acbe97496cb6bac7f6513e60d39db8eb02aea13bd7da26bd8fb7dfeba1eb380adf89d685cdc05a8cc510a5a067155a723292ad5e04f740406290ad2e76678ca9bd9bbcc347", &(0x7f0000000380)="9bdb3de23c3ce91fe0b6c0e79ec870153eace97dc48b25b2f4e85c90d75c7cb129b3009b99bc94829cad6c756926f5648abfab706b586b21c4834d6125eb51be6cfe952813cafcd916d1127e4ee9fb6bc065e12fcae6c46104e6399b9937055e6ebde36ec800f84a81d130153d4b50c435ac056dff268b255288ac67007abbc57f694be1eb8931abb83e74b197ee44791dee9405e9ee784dbaa5d7dd8be2c6cf07dd2ff590d27870d792700f192ed68165"}}) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000480), 0xffffffffffffffff) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 5: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0x1, &(0x7f0000000000)="3f6f691847de5bc330398367077b33af8ca95ffaa4436d1fdca873f86883629566ffc391eda38b7751d97e7d2936", &(0x7f0000000080)=""/247}, 0x20) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1}, @in6={0xa, 0x4e23, 0x1, @local, 0x8001}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r3, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) (async) openat$cgroup_pressure(r3, &(0x7f0000000680)='cpu.pressure\x00', 0x2, 0x0) (async) r4 = mq_open(&(0x7f0000000640)='\x00', 0x80, 0x0, &(0x7f0000000600)={0x369, 0xfffffffffffffff6, 0x1003, 0x9}) mq_notify(r4, &(0x7f0000000440)={0x0, 0x13, 0x4, @thr={&(0x7f0000000300)="1abc9f1589b51564e03bb3097713b138b098ee32ec799b64c99cea2b40acbe97496cb6bac7f6513e60d39db8eb02aea13bd7da26bd8fb7dfeba1eb380adf89d685cdc05a8cc510a5a067155a723292ad5e04f740406290ad2e76678ca9bd9bbcc347", &(0x7f0000000380)="9bdb3de23c3ce91fe0b6c0e79ec870153eace97dc48b25b2f4e85c90d75c7cb129b3009b99bc94829cad6c756926f5648abfab706b586b21c4834d6125eb51be6cfe952813cafcd916d1127e4ee9fb6bc065e12fcae6c46104e6399b9937055e6ebde36ec800f84a81d130153d4b50c435ac056dff268b255288ac67007abbc57f694be1eb8931abb83e74b197ee44791dee9405e9ee784dbaa5d7dd8be2c6cf07dd2ff590d27870d792700f192ed68165"}}) syz_genetlink_get_family_id$fou(&(0x7f0000000480), 0xffffffffffffffff) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async, rerun: 64) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) 15:09:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x28, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x341, 0x1}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x1, {0x300, 0x9, "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", 0x7f, 0x2, 0x1, 0x4, 0x6, 0x1, 0x3, 0x1}, r1}}, 0x128) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in6={0xa, 0x4e20, 0x38, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000300)={0x1, 0x10, 0xfa00, {&(0x7f00000002c0), r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x20, 0x400, @mcast2, 0x4}, r7}}, 0x30) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x1}}, 0x20) 15:09:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r4, 0xffffffff}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x28, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x341, 0x1}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x1, {0x300, 0x9, "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", 0x7f, 0x2, 0x1, 0x4, 0x6, 0x1, 0x3, 0x1}, r1}}, 0x128) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in6={0xa, 0x4e20, 0x38, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}}}, 0x90) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) 15:09:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x28, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x341, 0x1}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async, rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x1, {0x300, 0x9, "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", 0x7f, 0x2, 0x1, 0x4, 0x6, 0x1, 0x3, 0x1}, r1}}, 0x128) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in6={0xa, 0x4e20, 0x38, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}}}, 0x90) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 15:09:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r4, 0xffffffff}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_FD={0x8}, @L2TP_ATTR_MTU={0x6}, @L2TP_ATTR_VLAN_ID={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000300)={0x1, 0x10, 0xfa00, {&(0x7f00000002c0), r3}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x20, 0x400, @mcast2, 0x4}, r7}}, 0x30) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x1}}, 0x20) 15:09:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 15:09:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) 15:09:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0), 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID]}, 0x14}}, 0x0) 15:09:12 executing program 4: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000140)={0x3}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000180)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ptrace$poke(0x4, 0xffffffffffffffff, &(0x7f00000001c0), 0x1) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x4, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x27}}}}, [@NL80211_ATTR_KEY_IDX={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x40000) 15:09:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r1, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 15:09:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) 15:09:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r4, 0xffffffff}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r5, 0x11}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0xfffffffe}}, 0x10) 15:09:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r1, 0x19731f61430f9147}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 15:09:12 executing program 4: ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000c40)={{0x81, 0xdee}, {0x80, 0x9}, 0x9, 0x1}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000640), r2) sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f0000000980)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, r3, 0x4, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x72}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x24004840) sendmsg$TIPC_NL_KEY_FLUSH(r1, &(0x7f00000005c0)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000580)={&(0x7f0000000740)=ANY=[@ANYRES64=r1, @ANYRES16=r1, @ANYBLOB="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"], 0x208}}, 0x20000054) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x28, 0x0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x24040000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x28, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000c80)={0x1a4, r5, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x40, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_SOCK={0x9c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xed}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb9}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x28c}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1b1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x12}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd8, r6, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xa4c}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x64010102}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x42}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x40}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0xd8}, 0x1, 0x0, 0x0, 0x20040014}, 0x280d5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), r1) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r8, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x1c}}, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r7}}, 0x10) 15:09:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 15:09:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) 15:09:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r1, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 15:09:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:12 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000a8", @ANYRES16=r3, @ANYBLOB="000226bd7000fddbdf250e000000080005000180000008000500050000000c00028005000d0000000000"], 0x30}, 0x1, 0x0, 0x0, 0x7939edcfe3ae052d}, 0x4000840) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)=ANY=[@ANYBLOB="28010000", @ANYRES16=r5, @ANYBLOB="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"], 0x128}, 0x1, 0x0, 0x0, 0x4000800}, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_MGMT(r7, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x34, 0x0, 0x514083de2c9445b5, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TDLS_INITIATOR={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008810}, 0x8000) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) 15:09:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 15:09:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r5, 0x11}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0xfffffffe}}, 0x10) 15:09:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) 15:09:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xd62f09}}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x2}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xf}}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4e}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000004) 15:09:12 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000a8", @ANYRES16=r3, @ANYBLOB="000226bd7000fddbdf250e000000080005000180000008000500050000000c00028005000d0000000000"], 0x30}, 0x1, 0x0, 0x0, 0x7939edcfe3ae052d}, 0x4000840) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)=ANY=[@ANYBLOB="28010000", @ANYRES16=r5, @ANYBLOB="02002cbd7000fcdbdf25020000000c0009800800011acb0a00007000018008000300070000002c0004001400010002004e22ac1414aa00000000000000001400020002004e200a0101020000000000000000380004001400010002004e23ac14141e0000000000000000200002000a004e2400000001ff020000000000000000000000000001000000003400098008000100f7ffffff080002000300000008000100bbe10000080002003f00000008000100ff0f000008000200ff070000040004804c00098008000100050000000000020002000000080002008100000008000100c300000008000100080000000800010095c9c58f0800010002000000080001000300000008000100050000001400098008000200070000000800010006000000"], 0x128}, 0x1, 0x0, 0x0, 0x4000800}, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_MGMT(r7, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x34, 0x0, 0x514083de2c9445b5, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TDLS_INITIATOR={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008810}, 0x8000) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) socket$l2tp6(0xa, 0x2, 0x73) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000a8", @ANYRES16=r3, @ANYBLOB="000226bd7000fddbdf250e000000080005000180000008000500050000000c00028005000d0000000000"], 0x30}, 0x1, 0x0, 0x0, 0x7939edcfe3ae052d}, 0x4000840) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) (async) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)=ANY=[@ANYBLOB="28010000", @ANYRES16=r5, @ANYBLOB="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"], 0x128}, 0x1, 0x0, 0x0, 0x4000800}, 0x80) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$NL80211_CMD_TDLS_MGMT(r7, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x34, 0x0, 0x514083de2c9445b5, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TDLS_INITIATOR={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008810}, 0x8000) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) (async) 15:09:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xd62f09}}, 0x10) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x2}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xf}}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4e}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000004) 15:09:12 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) 15:09:12 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:12 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0xd62f09}}, 0x10) (async) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @empty}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x2}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xf}}}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4e}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000004) 15:09:12 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r5, 0x11}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0xfffffffe}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000000), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300), 0x2, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r5, 0x11}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0xfffffffe}}, 0x10) (async) 15:09:13 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 15:09:13 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000a8", @ANYRES16=r3, @ANYBLOB="000226bd7000fddbdf250e000000080005000180000008000500050000000c00028005000d0000000000"], 0x30}, 0x1, 0x0, 0x0, 0x7939edcfe3ae052d}, 0x4000840) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)=ANY=[@ANYBLOB="28010000", @ANYRES16=r5, @ANYBLOB="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"], 0x128}, 0x1, 0x0, 0x0, 0x4000800}, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TDLS_MGMT(r7, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)={0x34, 0x0, 0x514083de2c9445b5, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TDLS_INITIATOR={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4008810}, 0x8000) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6, 0x2}}, 0x10) 15:09:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, {0xa, 0x4e22, 0xffff, @mcast1, 0x4}, r1}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r9, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r10}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x4, {0x2bf, 0x2, "e6885237369e1373d804a4f1cf990d5bf7841392f85583390a5f8830d8d6c54c439a35e865bb618d4b3558999785e6a9189c37f2910a6bb5200141d28079996f08531acad8854416c953a19d4090e7ad8676a021bafc24cdb4c6fa55eaf6c3ec37ae7f4d158e4421181dc20278d9c1ca3ee7a78be3520872b7c2d98985ecbfb5f37e769690ee2cedb135eccf4572afee81130b6e4e2577a68329a4499fd0935c7cca558064b36f092b1708d8299b665c6d3fe374752dff8024e5e4043485cbb837d1d73baacd2a07afd56c3b770942b4c97d7529701d0bc5e5c288937f7aa65c599f2088cf23b5cad9dce6e37841c071dd88482d242d1e5c9180d85c6daae67e", 0x81, 0x1, 0x8, 0x81, 0x20, 0xfe, 0x1}, r10}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r7}}, 0x18) 15:09:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 15:09:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:13 executing program 5: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={&(0x7f0000000080), &(0x7f00000000c0)=""/202, &(0x7f00000001c0)="6f867581fe5e0be92b9c", &(0x7f0000000340)="239d947e1e25bb24bf120b37ded7ee8e5802df7d84f361187978b396671175838819ad8b4994040ba8013fa5537beafa7eac1771df9395521fcfa9976c2a3def0a5ab806c64cd964bb3747954a11319abb62119aab8fea3acf", 0x1, 0x1, 0x4}, 0x38) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:13 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000100)={0x18, 0xfffffffffffffffe, 0x0, {0x42ae}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f00000023c0)={0x28, 0x0, r4}, 0x28) write$FUSE_POLL(r0, &(0x7f0000000180)={0x18, 0x0, r4, {0x5}}, 0x18) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 15:09:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 15:09:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:13 executing program 5: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={&(0x7f0000000080), &(0x7f00000000c0)=""/202, &(0x7f00000001c0)="6f867581fe5e0be92b9c", &(0x7f0000000340)="239d947e1e25bb24bf120b37ded7ee8e5802df7d84f361187978b396671175838819ad8b4994040ba8013fa5537beafa7eac1771df9395521fcfa9976c2a3def0a5ab806c64cd964bb3747954a11319abb62119aab8fea3acf", 0x1, 0x1, 0x4}, 0x38) (async, rerun: 64) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000080)={0x11, 0x10}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, {0xa, 0x4e22, 0xffff, @mcast1, 0x4}, r1}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r9, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r10}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x4, {0x2bf, 0x2, "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", 0x81, 0x1, 0x8, 0x81, 0x20, 0xfe, 0x1}, r10}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r7}}, 0x18) 15:09:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2e, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r2, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x5, @remote, 0x40}, @in={0x2, 0x4e22, @multicast2}}}, 0x118) 15:09:13 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000100)={0x18, 0xfffffffffffffffe, 0x0, {0x42ae}}, 0x18) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f00000023c0)={0x28, 0x0, r4}, 0x28) (async) write$FUSE_POLL(r0, &(0x7f0000000180)={0x18, 0x0, r4, {0x5}}, 0x18) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 15:09:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2e, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r2, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x5, @remote, 0x40}, @in={0x2, 0x4e22, @multicast2}}}, 0x118) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x2e, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r2, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x5, @remote, 0x40}, @in={0x2, 0x4e22, @multicast2}}}, 0x118) (async) 15:09:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2e, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r2, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x5, @remote, 0x40}, @in={0x2, 0x4e22, @multicast2}}}, 0x118) 15:09:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:13 executing program 5: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={&(0x7f0000000080), &(0x7f00000000c0)=""/202, &(0x7f00000001c0)="6f867581fe5e0be92b9c", &(0x7f0000000340)="239d947e1e25bb24bf120b37ded7ee8e5802df7d84f361187978b396671175838819ad8b4994040ba8013fa5537beafa7eac1771df9395521fcfa9976c2a3def0a5ab806c64cd964bb3747954a11319abb62119aab8fea3acf", 0x1, 0x1, 0x4}, 0x38) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:13 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000100)={0x18, 0xfffffffffffffffe, 0x0, {0x42ae}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r3, &(0x7f00000023c0)={0x28, 0x0, r4}, 0x28) write$FUSE_POLL(r0, &(0x7f0000000180)={0x18, 0x0, r4, {0x5}}, 0x18) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) read$FUSE(r0, 0x0, 0x0) (async) write$FUSE_GETXATTR(r0, &(0x7f0000000100)={0x18, 0xfffffffffffffffe, 0x0, {0x42ae}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r3, &(0x7f0000000380)={0x2020}, 0x2020) (async) write$FUSE_LK(r3, &(0x7f00000023c0)={0x28, 0x0, r4}, 0x28) (async) write$FUSE_POLL(r0, &(0x7f0000000180)={0x18, 0x0, r4, {0x5}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f00000000c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) (async) 15:09:13 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, {0xa, 0x4e22, 0xffff, @mcast1, 0x4}, r1}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r9, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r10}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x4, {0x2bf, 0x2, "e6885237369e1373d804a4f1cf990d5bf7841392f85583390a5f8830d8d6c54c439a35e865bb618d4b3558999785e6a9189c37f2910a6bb5200141d28079996f08531acad8854416c953a19d4090e7ad8676a021bafc24cdb4c6fa55eaf6c3ec37ae7f4d158e4421181dc20278d9c1ca3ee7a78be3520872b7c2d98985ecbfb5f37e769690ee2cedb135eccf4572afee81130b6e4e2577a68329a4499fd0935c7cca558064b36f092b1708d8299b665c6d3fe374752dff8024e5e4043485cbb837d1d73baacd2a07afd56c3b770942b4c97d7529701d0bc5e5c288937f7aa65c599f2088cf23b5cad9dce6e37841c071dd88482d242d1e5c9180d85c6daae67e", 0x81, 0x1, 0x8, 0x81, 0x20, 0xfe, 0x1}, r10}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r7}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e22, 0xffff, @mcast1, 0x4}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r9, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r10}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x4, {0x2bf, 0x2, "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", 0x81, 0x1, 0x8, 0x81, 0x20, 0xfe, 0x1}, r10}}, 0x128) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r7}}, 0x18) (async) 15:09:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x41}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 15:09:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, {0xa, 0x4e20, 0x1, @loopback, 0x10000}, 0xffffffffffffffff, 0x1f}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x1000, 0x7e113927, "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", 0x4, 0x81, 0x7, 0x2, 0x7, 0x8, 0x0, 0x1}, r6}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x107, 0xfa00, {0xffffffffffffffff, 0x2, "080013", "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"}}, 0x110) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x9, r9, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r10, 0x2}}, 0x10) 15:09:13 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 15:09:13 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x41}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x41}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 15:09:14 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000300), 0x10000000000000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, &(0x7f00000009c0), 0x3, 0x0, &(0x7f0000000840)=[{}, {}, {}], 0xf, 0x0, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r6, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) 15:09:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:14 executing program 3: write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r3, 0xf3a}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 15:09:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, {0xa, 0x4e20, 0x1, @loopback, 0x10000}, 0xffffffffffffffff, 0x1f}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x1000, 0x7e113927, "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", 0x4, 0x81, 0x7, 0x2, 0x7, 0x8, 0x0, 0x1}, r6}}, 0x120) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x107, 0xfa00, {0xffffffffffffffff, 0x2, "080013", "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"}}, 0x110) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x9, r9, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r10, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, {0xa, 0x4e20, 0x1, @loopback, 0x10000}, 0xffffffffffffffff, 0x1f}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x1000, 0x7e113927, "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", 0x4, 0x81, 0x7, 0x2, 0x7, 0x8, 0x0, 0x1}, r6}}, 0x120) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x107, 0xfa00, {0xffffffffffffffff, 0x2, "080013", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r9}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x9, r9, 0x0, 0x0, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r10, 0x2}}, 0x10) (async) 15:09:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x41}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x41}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:14 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000300), 0x10000000000000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, &(0x7f00000009c0), 0x3, 0x0, &(0x7f0000000840)=[{}, {}, {}], 0xf, 0x0, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r6, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) 15:09:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 15:09:14 executing program 3: write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r3, 0xf3a}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:14 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 15:09:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 15:09:14 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 15:09:14 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 15:09:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:14 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000300), 0x10000000000000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, &(0x7f00000009c0), 0x3, 0x0, &(0x7f0000000840)=[{}, {}, {}], 0xf, 0x0, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r6, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) syz_open_dev$media(&(0x7f0000000300), 0x10000000000000, 0x0) (async) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, &(0x7f00000009c0), 0x3, 0x0, &(0x7f0000000840)=[{}, {}, {}], 0xf, 0x0, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r6, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) (async) 15:09:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}, {0xa, 0x4e20, 0x1, @loopback, 0x10000}, 0xffffffffffffffff, 0x1f}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x1000, 0x7e113927, "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", 0x4, 0x81, 0x7, 0x2, 0x7, 0x8, 0x0, 0x1}, r6}}, 0x120) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x107, 0xfa00, {0xffffffffffffffff, 0x2, "080013", "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"}}, 0x110) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x9, r9, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r10, 0x2}}, 0x10) 15:09:14 executing program 3: write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r3, 0xf3a}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r3, 0xf3a}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) (async) 15:09:14 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000540)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r2, &(0x7f00000025c0)=ANY=[@ANYBLOB="ff00000000000000", @ANYRES64=r3, @ANYBLOB="02000000000000000d00000000000000010000000300000000000000000000000600000000000000ee0d0000000000000500000009000000212ce77d230000000600000000000000b40000000000000001000000080000002100000000000000"], 0x70) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000500)={0x4, 0xffffffffffffff2f, 0xfa00, {r1, 0xfffff64b}}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x1}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000028c0)={0x18, 0x1, &(0x7f0000002680)=@raw=[@jmp={0x5, 0x1, 0x8, 0x8, 0x5, 0xfffffffffffffff0, 0xfffffffffffffff0}], &(0x7f0000002780)='GPL\x00', 0x9, 0xc, &(0x7f00000027c0)=""/12, 0x41100, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000002840)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000002880)={0x0, 0x7, 0x80000000, 0x4}, 0x10}, 0x80) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f0000002640)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, r9}}, 0x30) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000000)={0x0, 0x6}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:14 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:14 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000005c0)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:14 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000300), 0x10000000000000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, &(0x7f00000009c0), 0x3, 0x0, &(0x7f0000000840)=[{}, {}, {}], 0xf, 0x0, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r6, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) 15:09:14 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 15:09:14 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x742636b2859cf49e, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in6={0xa, 0x4e20, 0x4, @empty, 0x8}}}, 0x90) 15:09:14 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000540)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r2, &(0x7f00000025c0)=ANY=[@ANYBLOB="ff00000000000000", @ANYRES64=r3, @ANYBLOB="02000000000000000d00000000000000010000000300000000000000000000000600000000000000ee0d0000000000000500000009000000212ce77d230000000600000000000000b40000000000000001000000080000002100000000000000"], 0x70) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000500)={0x4, 0xffffffffffffff2f, 0xfa00, {r1, 0xfffff64b}}, 0x10) (rerun: 64) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x1}}, 0x18) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000028c0)={0x18, 0x1, &(0x7f0000002680)=@raw=[@jmp={0x5, 0x1, 0x8, 0x8, 0x5, 0xfffffffffffffff0, 0xfffffffffffffff0}], &(0x7f0000002780)='GPL\x00', 0x9, 0xc, &(0x7f00000027c0)=""/12, 0x41100, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000002840)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000002880)={0x0, 0x7, 0x80000000, 0x4}, 0x10}, 0x80) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r9}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f0000002640)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, r9}}, 0x30) (async) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000000)={0x0, 0x6}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:15 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 15:09:15 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 15:09:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000005c0)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x742636b2859cf49e, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in6={0xa, 0x4e20, 0x4, @empty, 0x8}}}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x742636b2859cf49e, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x0, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x13f, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in6={0xa, 0x4e20, 0x4, @empty, 0x8}}}, 0x90) (async) 15:09:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:15 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000300), 0x10000000000000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r0, 0xc0287c02, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r0, 0xc0487c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, &(0x7f00000009c0), 0x3, 0x0, &(0x7f0000000840)=[{}, {}, {}], 0xf, 0x0, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x7, 0x0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r6, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r2, 0x1}}, 0x10) 15:09:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0xbbee0d7813c588d0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x3}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x2, 0x9}}, 0x20) 15:09:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000005c0)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000540)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r2, &(0x7f00000025c0)=ANY=[@ANYBLOB="ff00000000000000", @ANYRES64=r3, @ANYBLOB="02000000000000000d00000000000000010000000300000000000000000000000600000000000000ee0d0000000000000500000009000000212ce77d230000000600000000000000b40000000000000001000000080000002100000000000000"], 0x70) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000500)={0x4, 0xffffffffffffff2f, 0xfa00, {r1, 0xfffff64b}}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000080)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x1}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000028c0)={0x18, 0x1, &(0x7f0000002680)=@raw=[@jmp={0x5, 0x1, 0x8, 0x8, 0x5, 0xfffffffffffffff0, 0xfffffffffffffff0}], &(0x7f0000002780)='GPL\x00', 0x9, 0xc, &(0x7f00000027c0)=""/12, 0x41100, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000002840)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000002880)={0x0, 0x7, 0x80000000, 0x4}, 0x10}, 0x80) (async, rerun: 64) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f0000002640)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}, r9}}, 0x30) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000000)={0x0, 0x6}) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x742636b2859cf49e, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in6={0xa, 0x4e20, 0x4, @empty, 0x8}}}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x742636b2859cf49e, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x0, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x13f, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in6={0xa, 0x4e20, 0x4, @empty, 0x8}}}, 0x90) (async) 15:09:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0xbbee0d7813c588d0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x3}}, 0x10) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x2, 0x9}}, 0x20) 15:09:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x41}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x38f}, {0xa, 0x4e22, 0x1, @local, 0x40}, r1, 0x200}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0x1, 0x4, "93d4121e9eb6d2ab8b3228300d153410dbda2d0dcd9af6b90550a2084b343972f6cdede169d516bc12f8d7f7c121f238c39cc5258a1c36d36dc71b856aa2e59ca34f76249471079839ecd4e3c0c6513a2e68eeda6c045b2309257de84590642dbc30878211bdf59d234da36edf3099e1b90a70845086052fe1b733d48277378e9da90e29268677110e574f2c167ecd419ed676823ede45de2682b3cdecded708d1f9855abc537384d8ee242b9368399a10f41f38c44d48c42cb89fa18733ddc264442f1b3c292c30569c270fae1b59de46bde5c04d66d42a279528820a945b0262de66400b71d17a188a4e434c0878a4b8b750689132ea073d78650adf36886e", 0x2, 0x2a, 0x3f, 0x7, 0x2d, 0x40, 0x4}, r3}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7f}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x4, 0x1, "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", 0xff, 0x6, 0x1, 0x5, 0xfb, 0x7, 0x3f}, r4}}, 0x120) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:09:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0xbbee0d7813c588d0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x3}}, 0x10) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x2, 0x9}}, 0x20) 15:09:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x38f}, {0xa, 0x4e22, 0x1, @local, 0x40}, r1, 0x200}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0x1, 0x4, "93d4121e9eb6d2ab8b3228300d153410dbda2d0dcd9af6b90550a2084b343972f6cdede169d516bc12f8d7f7c121f238c39cc5258a1c36d36dc71b856aa2e59ca34f76249471079839ecd4e3c0c6513a2e68eeda6c045b2309257de84590642dbc30878211bdf59d234da36edf3099e1b90a70845086052fe1b733d48277378e9da90e29268677110e574f2c167ecd419ed676823ede45de2682b3cdecded708d1f9855abc537384d8ee242b9368399a10f41f38c44d48c42cb89fa18733ddc264442f1b3c292c30569c270fae1b59de46bde5c04d66d42a279528820a945b0262de66400b71d17a188a4e434c0878a4b8b750689132ea073d78650adf36886e", 0x2, 0x2a, 0x3f, 0x7, 0x2d, 0x40, 0x4}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000300)={0x78, 0xffffffffffffffda, 0x0, {0x800, 0xc22, 0x0, {0x0, 0x2, 0xffffffffffffffff, 0x10000, 0x8, 0xc8a, 0x7f, 0x7, 0x6, 0x8000, 0x2, 0xee01, 0xee00, 0x1}}}, 0x78) read$FUSE(0xffffffffffffffff, &(0x7f0000000500)={0x2020}, 0x2020) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x70, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r4, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0xce, 0x7, "4be26af6138d100eafb491c275522ad38a62d08d169d9851496cda63c6654a1e0caebcea3e3d1f8a3cc6ea4c5a64cb356d9050de56d0fcf2410eedf594b5db0980e463f59d2d2f30c938ee477b6ae3322674df2857fe857becc4a63c2ec0cd5d864a1fcaeef2d39e0837b65d75964d30d33c43996c5e87e03f16c4447aeb365fcea100890af5b9d7962ab94a8bd2e346af6fc3605388b212dd760d399260cc231a88ea6e250fcc93b00a3c9a015133d6fdce1b895b7202182c8ad7d176ea3685797be1a55dc71882f66a50bcebed4bfcb278fb86fd873cf6528761b4ed134b988cf022f9819f76efc4e34ad5e5c87ef8f870933289e30f1b1968c9dd81250d22", 0x1, 0x8, 0xd4, 0x5, 0x2, 0x6, 0x7}, r1}}, 0x120) 15:09:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 15:09:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7f}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x4, 0x1, "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", 0xff, 0x6, 0x1, 0x5, 0xfb, 0x7, 0x3f}, r4}}, 0x120) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7f}}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x4, 0x1, "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", 0xff, 0x6, 0x1, 0x5, 0xfb, 0x7, 0x3f}, r4}}, 0x120) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) (async) 15:09:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x38f}, {0xa, 0x4e22, 0x1, @local, 0x40}, r1, 0x200}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0x1, 0x4, "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", 0x2, 0x2a, 0x3f, 0x7, 0x2d, 0x40, 0x4}, r3}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:15 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:15 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:15 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000300)={0x78, 0xffffffffffffffda, 0x0, {0x800, 0xc22, 0x0, {0x0, 0x2, 0xffffffffffffffff, 0x10000, 0x8, 0xc8a, 0x7f, 0x7, 0x6, 0x8000, 0x2, 0xee01, 0xee00, 0x1}}}, 0x78) read$FUSE(0xffffffffffffffff, &(0x7f0000000500)={0x2020}, 0x2020) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x70, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r4, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0xce, 0x7, "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", 0x1, 0x8, 0xd4, 0x5, 0x2, 0x6, 0x7}, r1}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000300)={0x78, 0xffffffffffffffda, 0x0, {0x800, 0xc22, 0x0, {0x0, 0x2, 0xffffffffffffffff, 0x10000, 0x8, 0xc8a, 0x7f, 0x7, 0x6, 0x8000, 0x2, 0xee01, 0xee00, 0x1}}}, 0x78) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000500)={0x2020}, 0x2020) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x70, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000480), 0x13f, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r4, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0xce, 0x7, "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", 0x1, 0x8, 0xd4, 0x5, 0x2, 0x6, 0x7}, r1}}, 0x120) (async) 15:09:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:15 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7f}}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x4, 0x1, "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", 0xff, 0x6, 0x1, 0x5, 0xfb, 0x7, 0x3f}, r4}}, 0x120) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e23, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7f}}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x4, 0x1, "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", 0xff, 0x6, 0x1, 0x5, 0xfb, 0x7, 0x3f}, r4}}, 0x120) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) (async) 15:09:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000300)={0x78, 0xffffffffffffffda, 0x0, {0x800, 0xc22, 0x0, {0x0, 0x2, 0xffffffffffffffff, 0x10000, 0x8, 0xc8a, 0x7f, 0x7, 0x6, 0x8000, 0x2, 0xee01, 0xee00, 0x1}}}, 0x78) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000500)={0x2020}, 0x2020) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x70, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x3c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x4000004) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r4, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0xce, 0x7, "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", 0x1, 0x8, 0xd4, 0x5, 0x2, 0x6, 0x7}, r1}}, 0x120) 15:09:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r4, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x840) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)}, 0x10) 15:09:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x5, 0x6, {"d015c435d97965abd0cd73ee69d48dd7"}, 0x8000000000000001, 0x8000000000000001, 0x6}, @in={0x2, 0x4e23, @local}}}, 0x118) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000380)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x80}, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}, r3, 0x5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r3}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r4, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x840) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x106}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r4, 0x19731f61430f9147}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x840) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:16 executing program 0: sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4040840) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x2}}, 0x20) 15:09:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)}, 0x10) (async) 15:09:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x5, 0x6, {"d015c435d97965abd0cd73ee69d48dd7"}, 0x8000000000000001, 0x8000000000000001, 0x6}, @in={0x2, 0x4e23, @local}}}, 0x118) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000380)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x80}, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}, r3, 0x5}}, 0x48) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:16 executing program 0: sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4040840) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x2}}, 0x20) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4040840) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x2}}, 0x20) (async) 15:09:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)}, 0x10) (rerun: 64) 15:09:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r4, 0x19731f61430f9147}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_IP_DADDR={0x8, 0x19, @multicast1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x840) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x5, 0x6, {"d015c435d97965abd0cd73ee69d48dd7"}, 0x8000000000000001, 0x8000000000000001, 0x6}, @in={0x2, 0x4e23, @local}}}, 0x118) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000380)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x80}, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}, r3, 0x5}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r3}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x13f, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x5, 0x6, {"d015c435d97965abd0cd73ee69d48dd7"}, 0x8000000000000001, 0x8000000000000001, 0x6}, @in={0x2, 0x4e23, @local}}}, 0x118) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000380)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x80}, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}, r3, 0x5}}, 0x48) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 0: sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {{}, {@void, @void}}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4040840) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2, 0x2}}, 0x20) 15:09:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0xfffffffa, @remote}, r3}}, 0x30) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @ib={0x1b, 0x9, 0x7fffffff, {"90aec2bc1c8131429f5af3e823c2a0d3"}, 0xfffffffffffffffb, 0x4, 0xfff}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x50d001, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e21, 0x4, @private0, 0x1b94823c}, r1}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:16 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0xfffffffa, @remote}, r3}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @ib={0x1b, 0x9, 0x7fffffff, {"90aec2bc1c8131429f5af3e823c2a0d3"}, 0xfffffffffffffffb, 0x4, 0xfff}}}, 0x90) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:16 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r4, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r5, 0x0, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000540)={{0x6, 0xffff}, {0x200, 0x603}, 0x80000000}) write$FUSE_INIT(r6, &(0x7f0000000300)={0x50, 0xfffffffffffffff5, 0x0, {0x7, 0x24, 0x3, 0xd2004, 0x1, 0x1, 0x9000, 0xe1}}, 0x50) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r1, 0x3, "271ea0", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @empty, 0x5}, @ib={0x1b, 0x7, 0x9, {"78876727e1b7260896e3d3ac05450409"}, 0x6, 0xffff, 0xffffffff}}}, 0x118) socket$inet6_udplite(0xa, 0x2, 0x88) 15:09:16 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 15:09:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x50d001, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e21, 0x4, @private0, 0x1b94823c}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:16 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:16 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:16 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 15:09:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0xfffffffa, @remote}, r3}}, 0x30) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @ib={0x1b, 0x9, 0x7fffffff, {"90aec2bc1c8131429f5af3e823c2a0d3"}, 0xfffffffffffffffb, 0x4, 0xfff}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r3}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0xfffffffa, @remote}, r3}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @ib={0x1b, 0x9, 0x7fffffff, {"90aec2bc1c8131429f5af3e823c2a0d3"}, 0xfffffffffffffffb, 0x4, 0xfff}}}, 0x90) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) (async) 15:09:17 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r0}}, 0x18) 15:09:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r4, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r5, 0x0, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000540)={{0x6, 0xffff}, {0x200, 0x603}, 0x80000000}) write$FUSE_INIT(r6, &(0x7f0000000300)={0x50, 0xfffffffffffffff5, 0x0, {0x7, 0x24, 0x3, 0xd2004, 0x1, 0x1, 0x9000, 0xe1}}, 0x50) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r1, 0x3, "271ea0", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @empty, 0x5}, @ib={0x1b, 0x7, 0x9, {"78876727e1b7260896e3d3ac05450409"}, 0x6, 0xffff, 0xffffffff}}}, 0x118) socket$inet6_udplite(0xa, 0x2, 0x88) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x2, 0x8}}, 0x20) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) read$FUSE(r4, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) read$FUSE(r5, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000540)={{0x6, 0xffff}, {0x200, 0x603}, 0x80000000}) (async) write$FUSE_INIT(r6, &(0x7f0000000300)={0x50, 0xfffffffffffffff5, 0x0, {0x7, 0x24, 0x3, 0xd2004, 0x1, 0x1, 0x9000, 0xe1}}, 0x50) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r1, 0x3, "271ea0", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @empty, 0x5}, @ib={0x1b, 0x7, 0x9, {"78876727e1b7260896e3d3ac05450409"}, 0x6, 0xffff, 0xffffffff}}}, 0x118) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) 15:09:17 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x50d001, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e21, 0x4, @private0, 0x1b94823c}, r1}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x50d001, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e21, 0x4, @private0, 0x1b94823c}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 15:09:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 15:09:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff0a, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4}, r5}}, 0x30) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000000200)={0x5, 0x10, 0xfa00, {&(0x7f00000005c0), r5, 0x1}}, 0x18) r7 = socket$nl_generic(0x10, 0x3, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r7, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r8, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r8, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x74e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x10) 15:09:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 15:09:17 executing program 5: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) 15:09:17 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r4, 0x0, 0x0) (async) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) read$FUSE(r5, 0x0, 0x0) (async) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) (async, rerun: 32) ioctl$PTP_PEROUT_REQUEST2(0xffffffffffffffff, 0x40383d0c, &(0x7f0000000540)={{0x6, 0xffff}, {0x200, 0x603}, 0x80000000}) (rerun: 32) write$FUSE_INIT(r6, &(0x7f0000000300)={0x50, 0xfffffffffffffff5, 0x0, {0x7, 0x24, 0x3, 0xd2004, 0x1, 0x1, 0x9000, 0xe1}}, 0x50) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r7, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r1, 0x3, "271ea0", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x2, @empty, 0x5}, @ib={0x1b, 0x7, 0x9, {"78876727e1b7260896e3d3ac05450409"}, 0x6, 0xffff, 0xffffffff}}}, 0x118) (async, rerun: 32) socket$inet6_udplite(0xa, 0x2, 0x88) (rerun: 32) 15:09:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 5: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) 15:09:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:17 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff0a, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4}, r5}}, 0x30) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000000200)={0x5, 0x10, 0xfa00, {&(0x7f00000005c0), r5, 0x1}}, 0x18) r7 = socket$nl_generic(0x10, 0x3, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r7, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r8, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r8, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x74e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff0a, 0xfa00, {0x2, &(0x7f0000000300), 0x13f, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4}, r5}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000000200)={0x5, 0x10, 0xfa00, {&(0x7f00000005c0), r5, 0x1}}, 0x18) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r7, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r8, 0x19731f61430f9147}, 0x14}}, 0x0) (async) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r8, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x74e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x10) (async) 15:09:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:17 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:18 executing program 5: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) (async) 15:09:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0xffffff01, @loopback, 0x71cc}, r5}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 15:09:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x300, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x0) r2 = syz_open_dev$media(&(0x7f0000000300), 0x10000000000000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r2, 0xc0287c02, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x48, r3, 0x8, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x10000, 0x34}}}}, [@NL80211_ATTR_KEY_SEQ={0x8, 0xa, "6310d03f"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "6ac24f4082"}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$MEDIA_IOC_SETUP_LINK(r2, 0xc0347c03, &(0x7f0000000000)={{0x80000000, 0x0, 0x0, [0x3f4, 0x4]}, {0x80000000, 0x0, 0x3, [0xffffff00, 0x7]}, 0x2, [0x614f87f5, 0x3]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) 15:09:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000003c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000380), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff0a, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r5, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4}, r5}}, 0x30) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async, rerun: 32) socket$inet6_tcp(0xa, 0x1, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000000200)={0x5, 0x10, 0xfa00, {&(0x7f00000005c0), r5, 0x1}}, 0x18) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async, rerun: 32) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r7, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r8, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r8, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x74e}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000040}, 0x10) 15:09:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 15:09:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x300, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x0) (async) r2 = syz_open_dev$media(&(0x7f0000000300), 0x10000000000000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r2, 0xc0287c02, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x48, r3, 0x8, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x10000, 0x34}}}}, [@NL80211_ATTR_KEY_SEQ={0x8, 0xa, "6310d03f"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "6ac24f4082"}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) (async) ioctl$MEDIA_IOC_SETUP_LINK(r2, 0xc0347c03, &(0x7f0000000000)={{0x80000000, 0x0, 0x0, [0x3f4, 0x4]}, {0x80000000, 0x0, 0x3, [0xffffff00, 0x7]}, 0x2, [0x614f87f5, 0x3]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) 15:09:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 15:09:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x300, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x0) r2 = syz_open_dev$media(&(0x7f0000000300), 0x10000000000000, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r2, 0xc0287c02, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x48, r3, 0x8, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x10000, 0x34}}}}, [@NL80211_ATTR_KEY_SEQ={0x8, 0xa, "6310d03f"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "6ac24f4082"}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$MEDIA_IOC_SETUP_LINK(r2, 0xc0347c03, &(0x7f0000000000)={{0x80000000, 0x0, 0x0, [0x3f4, 0x4]}, {0x80000000, 0x0, 0x3, [0xffffff00, 0x7]}, 0x2, [0x614f87f5, 0x3]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x300, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4080}, 0x0) (async) syz_open_dev$media(&(0x7f0000000300), 0x10000000000000, 0x0) (async) ioctl$MEDIA_IOC_ENUM_LINKS(r2, 0xc0287c02, 0x0) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x48, r3, 0x8, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x10000, 0x34}}}}, [@NL80211_ATTR_KEY_SEQ={0x8, 0xa, "6310d03f"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "6ac24f4082"}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) (async) ioctl$MEDIA_IOC_SETUP_LINK(r2, 0xc0347c03, &(0x7f0000000000)={{0x80000000, 0x0, 0x0, [0x3f4, 0x4]}, {0x80000000, 0x0, 0x3, [0xffffff00, 0x7]}, 0x2, [0x614f87f5, 0x3]}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async) 15:09:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x7, "cd52f0", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300), 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r5, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6}}, 0x10) 15:09:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0xffffff01, @loopback, 0x71cc}, r5}}, 0x38) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:18 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000004c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x3, 0x9, {"075f381a1559ce61ee5ea79a09b43054"}, 0x0, 0x47, 0x5}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:09:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 15:09:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x8, 0x0, "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", 0x1, 0x3f, 0x2, 0x9, 0xd5, 0x88, 0x7f}, r3}}, 0x120) 15:09:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 15:09:18 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 32) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x7, "cd52f0", "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"}}, 0x110) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300), 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r5, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6}}, 0x10) 15:09:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 15:09:18 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x8, 0x0, "25f552a768a3a97a22ff7ea911cced420b20ce3a5a88db38626c9b4b1286131fd3ec5961da1d72661079d8cdf8b94651261a39b8c18dbb7138311ce192539c1823a8210b6969d271ba6e34160c7cc86f428ae0939e851e5ff65413cd009862e2271499caea4cd9ac31d6481e5994423c4ec5256a49bfdb13c417911e2f883ab3b43998877821e75fb5e0ce2d03325eab65bbcf863cfc74c0c1e51d46360f0cf384f00ff31d67e2014f44edba2760742b832bc1f6f26c44dfe50f08a1acfdf2284e83b6e77b534bfb4ae22c9a83d01930a953437b3d2ffb5e2a3f14b2b86ff130ffb842fba94efcfaaf010973c9ed8b3ba32df764b3503c6b611446517acef391", 0x1, 0x3f, 0x2, 0x9, 0xd5, 0x88, 0x7f}, r3}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x111, 0x7}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x8, 0x0, "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", 0x1, 0x3f, 0x2, 0x9, 0xd5, 0x88, 0x7f}, r3}}, 0x120) (async) 15:09:18 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0xffffff01, @loopback, 0x71cc}, r5}}, 0x38) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:18 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000004c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x3, 0x9, {"075f381a1559ce61ee5ea79a09b43054"}, 0x0, 0x47, 0x5}}}, 0x90) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:09:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:19 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x8, 0x0, "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", 0x1, 0x3f, 0x2, 0x9, 0xd5, 0x88, 0x7f}, r3}}, 0x120) 15:09:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x116, 0xfa00, {r1, 0x0, "d66882", "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"}}, 0x110) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) 15:09:19 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x7, "cd52f0", "76a9e0381b4ed925e799c5fc8f6eae6c73af354812d22d65c8c3f8a7f7ff02f88d4fb0f4e528479365471341045c7a2ff4bf92a9e55c5bf0ff58a40b24a10c386818c759f4e741a031434ae0296802113c5ff8d17299f937a2f4657f9f89f6f6fb58c211729c7bbb871dfe2344ba2c2338e05d0bff0ad4e3eab29991a869aa9c9a59c93758a058646e12eba909bf13a1f749c0ef5b26625c8918b4a6e403cc017b125b0e452ed704ab9d836df48658ab3b77d32564828c1031a5c3b093850ea1819f7a7e21c6193668d3d795d2a762467d98fc10c3aa54d46735084cfcc47bbd0d3417552ff68deb238a64dd8f8e07dd5e6a06b6208d77598d920627070ccf2d"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300), 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r5, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x7, "cd52f0", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300), 0x2, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r5, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r6}}, 0x10) (async) 15:09:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:19 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x116, 0xfa00, {r1, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204e7f38dc89d31fce9b76cd1e01390501a46b0cf911db9230701fb678b7bade66385bc712709c9812ec906e992883800eba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async, rerun: 64) r3 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) 15:09:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:19 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:20 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000004c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000300)}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x3, 0x9, {"075f381a1559ce61ee5ea79a09b43054"}, 0x0, 0x47, 0x5}}}, 0x90) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:09:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x29, 0xfa00, {r1, 0x7}}, 0x10) 15:09:20 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r5}}, 0x20) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0xffffff01, @loopback, 0x71cc}, r5}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:20 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x116, 0xfa00, {r1, 0x0, "d66882", "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"}}, 0x110) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) 15:09:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 15:09:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000000)={{0x10000000002a68, 0xffffffff}, {0x10000000007, 0x9}, 0x3, 0x1}) 15:09:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x29, 0xfa00, {r1, 0x7}}, 0x10) 15:09:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async, rerun: 64) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (rerun: 64) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000140)) (async) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000000)={{0x10000000002a68, 0xffffffff}, {0x10000000007, 0x9}, 0x3, 0x1}) 15:09:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 15:09:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x29, 0xfa00, {r1, 0x7}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x2, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x29, 0xfa00, {r1, 0x7}}, 0x10) (async) 15:09:20 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 15:09:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000140)) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000000)={{0x10000000002a68, 0xffffffff}, {0x10000000007, 0x9}, 0x3, 0x1}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000140)) (async) ioctl$PTP_PEROUT_REQUEST(r2, 0x40383d03, &(0x7f0000000000)={{0x10000000002a68, 0xffffffff}, {0x10000000007, 0x9}, 0x3, 0x1}) (async) 15:09:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local}, 0x5}, {0xa, 0x4e20, 0x401, @mcast2, 0x2}, r3, 0x7}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0xfffffffffffffe50) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {r1, 0x0, "18b0e7", "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"}}, 0x110) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r1, 0x3}}, 0x10) 15:09:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 15:09:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x400, 0x2) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, r2, {0x7, 0x24, 0x5, 0x400a15, 0x2, 0x3, 0x2, 0x4}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, r2, {0x9, 0x3, 0x0, {0x0, 0x400, 0x3f, 0x8, 0x2e80, 0x1, 0xfff, 0x10, 0x54, 0x6000, 0x38d, r4, 0xee01, 0x81d8, 0x4}}}, 0x78) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000180)={0xfffffffe, 0x4, 0x10004, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000001c0)={r5}) 15:09:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x7fffc, &(0x7f0000000000)={0xffffffffffffffff}, 0x8c891b7c837b4f92, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1f66, @private2, 0x1}, {0xa, 0x4e22, 0x6e76, @mcast2, 0x6}, r4, 0xa7}}, 0x48) 15:09:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x400, 0x2) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, r2, {0x7, 0x24, 0x5, 0x400a15, 0x2, 0x3, 0x2, 0x4}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, r2, {0x9, 0x3, 0x0, {0x0, 0x400, 0x3f, 0x8, 0x2e80, 0x1, 0xfff, 0x10, 0x54, 0x6000, 0x38d, r4, 0xee01, 0x81d8, 0x4}}}, 0x78) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000180)={0xfffffffe, 0x4, 0x10004, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000001c0)={r5}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000004380)={0x2020}, 0x2020) (async) syz_open_dev$dri(&(0x7f0000000000), 0x400, 0x2) (async) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, r2, {0x7, 0x24, 0x5, 0x400a15, 0x2, 0x3, 0x2, 0x4}}, 0x50) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020}, 0x2020) (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, r2, {0x9, 0x3, 0x0, {0x0, 0x400, 0x3f, 0x8, 0x2e80, 0x1, 0xfff, 0x10, 0x54, 0x6000, 0x38d, r4, 0xee01, 0x81d8, 0x4}}}, 0x78) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000180)={0xfffffffe, 0x4, 0x10004}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000001c0)={r5}) (async) 15:09:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 15:09:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local}, 0x5}, {0xa, 0x4e20, 0x401, @mcast2, 0x2}, r3, 0x7}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0xfffffffffffffe50) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {r1, 0x0, "18b0e7", "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"}}, 0x110) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r1, 0x3}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x111, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local}, 0x5}, {0xa, 0x4e20, 0x401, @mcast2, 0x2}, r3, 0x7}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0xfffffffffffffe50) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {r1, 0x0, "18b0e7", "d64e40410ae7c0602e6168540755fa62bc4f0bb88066083e1ddebb4f5e95f431978eafc20fb3aafbdfc4fd80b48299152d87d1dc7171b5c56ec71c9f433e8553409001ab9c104d3bec5bd301aad120467ab5ad542c8db86219c21bb183a700e6196aed6b5a79ac858773d88e983cfe343ebea1b8f4715a26522e482bd1778521321304e2862a5d9c4fcd1cb933b2d71f2495bf8b5fc58ad51bd057f81e7bb9811bd67e56ad5f72a92657376da093403d11f8e080eb43b25e4ecc90ca73222b21478e380d45b90eac23ca6bb488f190a01124581719c5e711364e8dced1f90c8cb52a76c2baa3234ebcc7506c10bccfbfaeb89694d713e9137bc2ef1af4c59cce"}}, 0x110) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r1, 0x3}}, 0x10) (async) 15:09:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x7fffc, &(0x7f0000000000)={0xffffffffffffffff}, 0x8c891b7c837b4f92, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1f66, @private2, 0x1}, {0xa, 0x4e22, 0x6e76, @mcast2, 0x6}, r4, 0xa7}}, 0x48) 15:09:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r3}}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x400, 0x2) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, r2, {0x7, 0x24, 0x5, 0x400a15, 0x2, 0x3, 0x2, 0x4}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, r2, {0x9, 0x3, 0x0, {0x0, 0x400, 0x3f, 0x8, 0x2e80, 0x1, 0xfff, 0x10, 0x54, 0x6000, 0x38d, r4, 0xee01, 0x81d8, 0x4}}}, 0x78) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000180)={0xfffffffe, 0x4, 0x10004, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000001c0)={r5}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000004380)={0x2020}, 0x2020) (async) syz_open_dev$dri(&(0x7f0000000000), 0x400, 0x2) (async) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, r2, {0x7, 0x24, 0x5, 0x400a15, 0x2, 0x3, 0x2, 0x4}}, 0x50) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020}, 0x2020) (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, r2, {0x9, 0x3, 0x0, {0x0, 0x400, 0x3f, 0x8, 0x2e80, 0x1, 0xfff, 0x10, 0x54, 0x6000, 0x38d, r4, 0xee01, 0x81d8, 0x4}}}, 0x78) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000180)={0xfffffffe, 0x4, 0x10004}) (async) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000001c0)={r5}) (async) 15:09:21 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000004380)={0x2020, 0x0, 0x0}, 0x2020) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x400, 0x2) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, r2, {0x7, 0x24, 0x5, 0x400a15, 0x2, 0x3, 0x2, 0x4}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, r2, {0x9, 0x3, 0x0, {0x0, 0x400, 0x3f, 0x8, 0x2e80, 0x1, 0xfff, 0x10, 0x54, 0x6000, 0x38d, r4, 0xee01, 0x81d8, 0x4}}}, 0x78) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000180)={0xfffffffe, 0x4, 0x10004, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r3, 0xc01064b3, &(0x7f00000001c0)={r5}) 15:09:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 15:09:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local}, 0x5}, {0xa, 0x4e20, 0x401, @mcast2, 0x2}, r3, 0x7}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0xfffffffffffffe50) (async, rerun: 32) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {r1, 0x0, "18b0e7", "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"}}, 0x110) (async, rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r1, 0x3}}, 0x10) 15:09:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0xffffffffffffffcb, 0xfa00, {r1, 0x8}}, 0x10) 15:09:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0xffffffffffffffcb, 0xfa00, {r1, 0x8}}, 0x10) 15:09:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 15:09:21 executing program 4: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) 15:09:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0xffffffffffffffcb, 0xfa00, {r1, 0x8}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0xffffffffffffffcb, 0xfa00, {r1, 0x8}}, 0x10) (async) 15:09:21 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x7fffc, &(0x7f0000000000)={0xffffffffffffffff}, 0x8c891b7c837b4f92, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1f66, @private2, 0x1}, {0xa, 0x4e22, 0x6e76, @mcast2, 0x6}, r4, 0xa7}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x7fffc, &(0x7f0000000000), 0x8c891b7c837b4f92, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1f66, @private2, 0x1}, {0xa, 0x4e22, 0x6e76, @mcast2, 0x6}, r4, 0xa7}}, 0x48) (async) 15:09:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) 15:09:21 executing program 4: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) 15:09:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, &(0x7f0000000000)={{0x4, 0xfff}, {0x5, 0x8}, 0xba9, 0x1}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x4002, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb73}}}, 0x30) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:09:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:21 executing program 4: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) 15:09:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) socket$inet6_tcp(0xa, 0x1, 0x0) 15:09:21 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (rerun: 32) 15:09:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, &(0x7f0000000000)={{0x4, 0xfff}, {0x5, 0x8}, 0xba9, 0x1}) (async) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x4002, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb73}}}, 0x30) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:09:21 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000)="86925d728a3035f619d7", &(0x7f0000000080)=@buf="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"}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:22 executing program 4: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10}, 0x18) 15:09:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, &(0x7f0000000000)={{0x4, 0xfff}, {0x5, 0x8}, 0xba9, 0x1}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x4002, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb73}}}, 0x30) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$PTP_PEROUT_REQUEST(0xffffffffffffffff, 0x40383d03, &(0x7f0000000000)={{0x4, 0xfff}, {0x5, 0x8}, 0xba9, 0x1}) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x4002, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xb73}}}, 0x30) (async) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x1) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000080)) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) (async) 15:09:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000)="86925d728a3035f619d7", &(0x7f0000000080)=@buf="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"}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (rerun: 32) 15:09:22 executing program 4: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) 15:09:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000006c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000500)=[{0x8, 0x0, [0x2659, 0x5, 0x401, 0x0, 0x8, 0x6fe, 0x8000, 0x5f0, 0x1ff, 0x2, 0x100, 0x10000, 0x635, 0x4, 0xffff413a, 0xa630825]}, {0x2, 0x0, [0x9, 0x126, 0x3ff, 0x7ff, 0x5, 0x9, 0x80000000, 0x7fff, 0x3, 0x6ee, 0x100, 0x6, 0xfffffffa, 0x70e0, 0x43, 0x1]}, {0x24, 0x0, [0x7f2, 0x24fa, 0x7fffffff, 0xfffffff7, 0x2, 0xbe0, 0xff, 0x8eef, 0x4, 0x2, 0xd687, 0x1000, 0x8001, 0xffffffff, 0x1, 0xe157]}, {0x5, 0x0, [0x0, 0x3, 0x6, 0x0, 0x8, 0x800, 0x5, 0x5, 0x5, 0x324, 0x20, 0x1, 0x8, 0x6, 0xff]}, {0x14, 0x0, [0x25391e47, 0x1f, 0x4, 0x7f, 0x5, 0x7, 0x354b, 0x10001, 0x80, 0x1, 0x81, 0x24, 0x1000, 0x1ff, 0x100, 0x7]}], r2, 0x1, 0x1, 0x168}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x1}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {r1, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x0, @empty, 0x4}, @in={0x2, 0x4e24, @empty}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000)="86925d728a3035f619d7", &(0x7f0000000080)=@buf="b8e8267560383fb1fb8c64b076ed815b4e9f5ee65d1d3508e57e5946bc52f45b19777e5efb7391ebd326d4c589cb01d78221decdfa93fb6c644c3250b3091bca732561a1b4bca11a1a0aac2ee96fb96ec9fff02310d22bbf4412c4d41d4789987db9f314ba619b50cf9c6467548d445f02d1bff1aabf88071b09af834366012698609c24e603c680f6546394747894385f38678f8432a43e9d18ba4c426fca327de6a2bcb1d6e8f9a34dd230c8cfd38ea7c52cafe68fcbafd5e36731ade2a2c16377e32fd03eb35391aefa02eea2274d74e88f957c048a1af4c391866c526d94f34054dc4abdb8b48fe8789bb343dd2c304a92d0cdea19a8de5008baa7ba66"}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) 15:09:22 executing program 4: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x2}}, 0x20) 15:09:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000006c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000500)=[{0x8, 0x0, [0x2659, 0x5, 0x401, 0x0, 0x8, 0x6fe, 0x8000, 0x5f0, 0x1ff, 0x2, 0x100, 0x10000, 0x635, 0x4, 0xffff413a, 0xa630825]}, {0x2, 0x0, [0x9, 0x126, 0x3ff, 0x7ff, 0x5, 0x9, 0x80000000, 0x7fff, 0x3, 0x6ee, 0x100, 0x6, 0xfffffffa, 0x70e0, 0x43, 0x1]}, {0x24, 0x0, [0x7f2, 0x24fa, 0x7fffffff, 0xfffffff7, 0x2, 0xbe0, 0xff, 0x8eef, 0x4, 0x2, 0xd687, 0x1000, 0x8001, 0xffffffff, 0x1, 0xe157]}, {0x5, 0x0, [0x0, 0x3, 0x6, 0x0, 0x8, 0x800, 0x5, 0x5, 0x5, 0x324, 0x20, 0x1, 0x8, 0x6, 0xff]}, {0x14, 0x0, [0x25391e47, 0x1f, 0x4, 0x7f, 0x5, 0x7, 0x354b, 0x10001, 0x80, 0x1, 0x81, 0x24, 0x1000, 0x1ff, 0x100, 0x7]}], r2, 0x1, 0x1, 0x168}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x1}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {r1, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x0, @empty, 0x4}, @in={0x2, 0x4e24, @empty}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000006c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000500)=[{0x8, 0x0, [0x2659, 0x5, 0x401, 0x0, 0x8, 0x6fe, 0x8000, 0x5f0, 0x1ff, 0x2, 0x100, 0x10000, 0x635, 0x4, 0xffff413a, 0xa630825]}, {0x2, 0x0, [0x9, 0x126, 0x3ff, 0x7ff, 0x5, 0x9, 0x80000000, 0x7fff, 0x3, 0x6ee, 0x100, 0x6, 0xfffffffa, 0x70e0, 0x43, 0x1]}, {0x24, 0x0, [0x7f2, 0x24fa, 0x7fffffff, 0xfffffff7, 0x2, 0xbe0, 0xff, 0x8eef, 0x4, 0x2, 0xd687, 0x1000, 0x8001, 0xffffffff, 0x1, 0xe157]}, {0x5, 0x0, [0x0, 0x3, 0x6, 0x0, 0x8, 0x800, 0x5, 0x5, 0x5, 0x324, 0x20, 0x1, 0x8, 0x6, 0xff]}, {0x14, 0x0, [0x25391e47, 0x1f, 0x4, 0x7f, 0x5, 0x7, 0x354b, 0x10001, 0x80, 0x1, 0x81, 0x24, 0x1000, 0x1ff, 0x100, 0x7]}], r2, 0x1, 0x1, 0x168}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x1}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {r1, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x0, @empty, 0x4}, @in={0x2, 0x4e24, @empty}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:22 executing program 4: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r4}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x4002}}, 0x10) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r8, 0x2, "88a1a0", "6365464c0d8997b2672c6d3c17312ccf41aef9bd424e2963e59b60758f30227dc8516d7a4180ca27c1d848fd793352bde6b74436c61543c035df632baf25436db9d765ba04a7a71e83d0760c9f0dc2078a9fb6c79584a08e4b7e817b5b138dcdda238f4b95ee39549d2a393020de7243576a2b95b5faa8a1c7706f8ac2b69054001e63f684651c0fa7232d1b1f5443f077aa9642e9e90acb206908c366877afec3ba7ebcb7ebfb42317fe7c84242709cf300a7676b1f19d186a759fd5481e6cf83404414f129da9429dd47c36622bef6c68deccd44576cf7b9310f338cff99771cbb0c1fbada3a2caeb86126dfc65e51c139bedae5eb820e9023d7af679268dd"}}, 0x110) 15:09:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x27, 0x2, @thr={&(0x7f0000000140)="08ae4e78a6e6ead85dd1dfa68fd876d8899139e26484f0204cb8512afba3497c7afc749d8a7fbf8377d21a453f4c075721184aa6880e5429464586fdcf60d14bfbb59905f2148704e427f8e4f5ccf5def918739fca2d2b726d0f7aaf62de95e6d4516bced495fd019cbe17c8491c7a808d2c5f6637c0b94e6140d523f5ecfdb71e55d4354a96efc4deef459e3a585fc11022f63b8d77bb6a8a9c4810e13cb0adcdd63c54672b4d9b3cbf63de1df0940c78db8f361c406e36a8e27c7187401c8daceaca4d48dc63e89f41513c05cd3ac309a470ca0a87c72757da1ed3409e9b97223a523a310728bda2a979", &(0x7f0000000300)="aa671fa3de62cb49b7b89cd2d10e0ac2cb2fb6414ef045830fbc150711a387cc831d2262a68ebe5e49366c8c8c080ab089837d9ad1c903387331598531efae58e13807b0e181e90dacccbacab6c95f2b7be56cffa06a6aa421f71322bdac2519bd7eb7ea7f6952a2d41429d72a07abc01afec223db39e766f43d7a888f9f5301ec2e6a8ce8d6b27410e159224373f83ee855b5865865a1e58df43c7b822dd7e88193ae5a9d8c1185a5e550ea242dce8c22d4a615a3c488ef22673b99862a4ba63529b6"}}) 15:09:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000006c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000500)=[{0x8, 0x0, [0x2659, 0x5, 0x401, 0x0, 0x8, 0x6fe, 0x8000, 0x5f0, 0x1ff, 0x2, 0x100, 0x10000, 0x635, 0x4, 0xffff413a, 0xa630825]}, {0x2, 0x0, [0x9, 0x126, 0x3ff, 0x7ff, 0x5, 0x9, 0x80000000, 0x7fff, 0x3, 0x6ee, 0x100, 0x6, 0xfffffffa, 0x70e0, 0x43, 0x1]}, {0x24, 0x0, [0x7f2, 0x24fa, 0x7fffffff, 0xfffffff7, 0x2, 0xbe0, 0xff, 0x8eef, 0x4, 0x2, 0xd687, 0x1000, 0x8001, 0xffffffff, 0x1, 0xe157]}, {0x5, 0x0, [0x0, 0x3, 0x6, 0x0, 0x8, 0x800, 0x5, 0x5, 0x5, 0x324, 0x20, 0x1, 0x8, 0x6, 0xff]}, {0x14, 0x0, [0x25391e47, 0x1f, 0x4, 0x7f, 0x5, 0x7, 0x354b, 0x10001, 0x80, 0x1, 0x81, 0x24, 0x1000, 0x1ff, 0x100, 0x7]}], r2, 0x1, 0x1, 0x168}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x1}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {r1, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x0, @empty, 0x4}, @in={0x2, 0x4e24, @empty}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000006c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000500)=[{0x8, 0x0, [0x2659, 0x5, 0x401, 0x0, 0x8, 0x6fe, 0x8000, 0x5f0, 0x1ff, 0x2, 0x100, 0x10000, 0x635, 0x4, 0xffff413a, 0xa630825]}, {0x2, 0x0, [0x9, 0x126, 0x3ff, 0x7ff, 0x5, 0x9, 0x80000000, 0x7fff, 0x3, 0x6ee, 0x100, 0x6, 0xfffffffa, 0x70e0, 0x43, 0x1]}, {0x24, 0x0, [0x7f2, 0x24fa, 0x7fffffff, 0xfffffff7, 0x2, 0xbe0, 0xff, 0x8eef, 0x4, 0x2, 0xd687, 0x1000, 0x8001, 0xffffffff, 0x1, 0xe157]}, {0x5, 0x0, [0x0, 0x3, 0x6, 0x0, 0x8, 0x800, 0x5, 0x5, 0x5, 0x324, 0x20, 0x1, 0x8, 0x6, 0xff]}, {0x14, 0x0, [0x25391e47, 0x1f, 0x4, 0x7f, 0x5, 0x7, 0x354b, 0x10001, 0x80, 0x1, 0x81, 0x24, 0x1000, 0x1ff, 0x100, 0x7]}], r2, 0x1, 0x1, 0x168}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x1}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {r1, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x0, @empty, 0x4}, @in={0x2, 0x4e24, @empty}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:22 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:22 executing program 4: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) 15:09:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0xfffffffffffffcd0, 0xfa00, {r1, 0x7}}, 0x10) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000080)={0x0, 0x2fb5}) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f00000000c0)={0x2, 0x7fff}) 15:09:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x27, 0x2, @thr={&(0x7f0000000140)="08ae4e78a6e6ead85dd1dfa68fd876d8899139e26484f0204cb8512afba3497c7afc749d8a7fbf8377d21a453f4c075721184aa6880e5429464586fdcf60d14bfbb59905f2148704e427f8e4f5ccf5def918739fca2d2b726d0f7aaf62de95e6d4516bced495fd019cbe17c8491c7a808d2c5f6637c0b94e6140d523f5ecfdb71e55d4354a96efc4deef459e3a585fc11022f63b8d77bb6a8a9c4810e13cb0adcdd63c54672b4d9b3cbf63de1df0940c78db8f361c406e36a8e27c7187401c8daceaca4d48dc63e89f41513c05cd3ac309a470ca0a87c72757da1ed3409e9b97223a523a310728bda2a979", &(0x7f0000000300)="aa671fa3de62cb49b7b89cd2d10e0ac2cb2fb6414ef045830fbc150711a387cc831d2262a68ebe5e49366c8c8c080ab089837d9ad1c903387331598531efae58e13807b0e181e90dacccbacab6c95f2b7be56cffa06a6aa421f71322bdac2519bd7eb7ea7f6952a2d41429d72a07abc01afec223db39e766f43d7a888f9f5301ec2e6a8ce8d6b27410e159224373f83ee855b5865865a1e58df43c7b822dd7e88193ae5a9d8c1185a5e550ea242dce8c22d4a615a3c488ef22673b99862a4ba63529b6"}}) 15:09:22 executing program 4: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 15:09:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r4, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4d80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4014}, 0x0) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x20}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xc0}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000004}, 0x40000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) syz_genetlink_get_family_id$fou(&(0x7f0000000500), r4) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_GET_KEY(r5, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x8c, r6, 0x100, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x70, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "2cc2e16043"}, @NL80211_KEY_SEQ={0x14, 0x4, "e5efe4d129e6722fd736c6e5a316d5ff"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "3fd39be006e28b6a85791efc8d"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40004}, 0x20000840) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r7) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dbdbff, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8c4}, 0x20000881) 15:09:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r4}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x4002}}, 0x10) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r8, 0x2, "88a1a0", "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"}}, 0x110) 15:09:22 executing program 4: syslog(0x9, &(0x7f0000000100)=""/47, 0x2f) 15:09:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x27, 0x2, @thr={&(0x7f0000000140)="08ae4e78a6e6ead85dd1dfa68fd876d8899139e26484f0204cb8512afba3497c7afc749d8a7fbf8377d21a453f4c075721184aa6880e5429464586fdcf60d14bfbb59905f2148704e427f8e4f5ccf5def918739fca2d2b726d0f7aaf62de95e6d4516bced495fd019cbe17c8491c7a808d2c5f6637c0b94e6140d523f5ecfdb71e55d4354a96efc4deef459e3a585fc11022f63b8d77bb6a8a9c4810e13cb0adcdd63c54672b4d9b3cbf63de1df0940c78db8f361c406e36a8e27c7187401c8daceaca4d48dc63e89f41513c05cd3ac309a470ca0a87c72757da1ed3409e9b97223a523a310728bda2a979", &(0x7f0000000300)="aa671fa3de62cb49b7b89cd2d10e0ac2cb2fb6414ef045830fbc150711a387cc831d2262a68ebe5e49366c8c8c080ab089837d9ad1c903387331598531efae58e13807b0e181e90dacccbacab6c95f2b7be56cffa06a6aa421f71322bdac2519bd7eb7ea7f6952a2d41429d72a07abc01afec223db39e766f43d7a888f9f5301ec2e6a8ce8d6b27410e159224373f83ee855b5865865a1e58df43c7b822dd7e88193ae5a9d8c1185a5e550ea242dce8c22d4a615a3c488ef22673b99862a4ba63529b6"}}) 15:09:22 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0xfffffffffffffcd0, 0xfa00, {r1, 0x7}}, 0x10) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000080)={0x0, 0x2fb5}) (async, rerun: 64) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f00000000c0)={0x2, 0x7fff}) 15:09:22 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r4, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r4, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:22 executing program 4: syslog(0x0, &(0x7f0000000100)=""/47, 0x2f) 15:09:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4d80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4014}, 0x0) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x20}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xc0}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000004}, 0x40000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) syz_genetlink_get_family_id$fou(&(0x7f0000000500), r4) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_GET_KEY(r5, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x8c, r6, 0x100, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x70, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "2cc2e16043"}, @NL80211_KEY_SEQ={0x14, 0x4, "e5efe4d129e6722fd736c6e5a316d5ff"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "3fd39be006e28b6a85791efc8d"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40004}, 0x20000840) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r7) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dbdbff, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8c4}, 0x20000881) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4d80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4014}, 0x0) (async) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x20}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xc0}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000004}, 0x40000) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240), 0x2}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000500), r4) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) (async) sendmsg$NL80211_CMD_GET_KEY(r5, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x8c, r6, 0x100, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x70, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "2cc2e16043"}, @NL80211_KEY_SEQ={0x14, 0x4, "e5efe4d129e6722fd736c6e5a316d5ff"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "3fd39be006e28b6a85791efc8d"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40004}, 0x20000840) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r7) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dbdbff, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8c4}, 0x20000881) (async) 15:09:22 executing program 4: syslog(0x0, &(0x7f0000000100)=""/47, 0x2f) 15:09:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)) 15:09:22 executing program 4: syslog(0x0, &(0x7f0000000100)=""/47, 0x2f) 15:09:23 executing program 4: syslog(0x9, 0x0, 0x0) 15:09:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4d80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4014}, 0x0) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x20}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xc0}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000004}, 0x40000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) syz_genetlink_get_family_id$fou(&(0x7f0000000500), r4) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_GET_KEY(r5, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x8c, r6, 0x100, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x70, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "2cc2e16043"}, @NL80211_KEY_SEQ={0x14, 0x4, "e5efe4d129e6722fd736c6e5a316d5ff"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "3fd39be006e28b6a85791efc8d"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40004}, 0x20000840) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r7) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dbdbff, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8c4}, 0x20000881) 15:09:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000000c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x4002}}, 0x10) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r8, 0x2, "88a1a0", "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"}}, 0x110) 15:09:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4d80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4014}, 0x0) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x20}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xc0}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000004}, 0x40000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) syz_genetlink_get_family_id$fou(&(0x7f0000000500), r4) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_GET_KEY(r5, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x8c, r6, 0x100, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x70, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "2cc2e16043"}, @NL80211_KEY_SEQ={0x14, 0x4, "e5efe4d129e6722fd736c6e5a316d5ff"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "3fd39be006e28b6a85791efc8d"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40004}, 0x20000840) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r7) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dbdbff, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8c4}, 0x20000881) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4d80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4014}, 0x0) (async) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x20}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xc0}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000004}, 0x40000) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240), 0x2}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000500), r4) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) (async) sendmsg$NL80211_CMD_GET_KEY(r5, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x8c, r6, 0x100, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x70, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "2cc2e16043"}, @NL80211_KEY_SEQ={0x14, 0x4, "e5efe4d129e6722fd736c6e5a316d5ff"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "3fd39be006e28b6a85791efc8d"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40004}, 0x20000840) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r7) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dbdbff, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8c4}, 0x20000881) (async) 15:09:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0xfffffffffffffcd0, 0xfa00, {r1, 0x7}}, 0x10) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000080)={0x0, 0x2fb5}) (async) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f00000000c0)={0x2, 0x7fff}) 15:09:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r4, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000)=0x1, r4, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000100)) 15:09:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4d80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3ff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4014}, 0x0) sendmsg$NL80211_CMD_START_NAN(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x20}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xc0}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000004}, 0x40000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r4) syz_genetlink_get_family_id$fou(&(0x7f0000000500), r4) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_GET_KEY(r5, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x8c, r6, 0x100, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_KEY={0x70, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "2cc2e16043"}, @NL80211_KEY_SEQ={0x14, 0x4, "e5efe4d129e6722fd736c6e5a316d5ff"}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "3fd39be006e28b6a85791efc8d"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x14, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40004}, 0x20000840) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r7) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x200, 0x70bd26, 0x25dbdbff, {}, [@L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8c4}, 0x20000881) 15:09:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 15:09:23 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000000)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0x8, &(0x7f0000000580)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x25dfdbff, {}, [@L2TP_ATTR_CONN_ID={0x0, 0x9, 0x2}, @L2TP_ATTR_FD, @L2TP_ATTR_MTU, @L2TP_ATTR_VLAN_ID={0x0, 0xe, 0x401}]}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0xfffbffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040804}, 0x8890) 15:09:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x80000000}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}]}, 0x50}, 0x1, 0x0, 0x0, 0x8005}, 0x2c004800) 15:09:23 executing program 3: mq_open(&(0x7f0000000180)='/dev/cuse\x00', 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@WGDEVICE_A_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000880d}, 0x24000000) 15:09:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0xe74cda0d200c5ada}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 15:09:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) 15:09:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x80000000}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}]}, 0x50}, 0x1, 0x0, 0x0, 0x8005}, 0x2c004800) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000240), 0x2, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) (async) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x80000000}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}]}, 0x50}, 0x1, 0x0, 0x0, 0x8005}, 0x2c004800) (async) 15:09:23 executing program 3: mq_open(&(0x7f0000000180)='/dev/cuse\x00', 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@WGDEVICE_A_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000880d}, 0x24000000) 15:09:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0xe74cda0d200c5ada}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000240)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x80000000}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}]}, 0x50}, 0x1, 0x0, 0x0, 0x8005}, 0x2c004800) 15:09:23 executing program 3: mq_open(&(0x7f0000000180)='/dev/cuse\x00', 0x0, 0x0, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@WGDEVICE_A_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000880d}, 0x24000000) 15:09:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0xe74cda0d200c5ada}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:23 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x200, 0xdbb9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000001c0)={0x0, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) mq_open(&(0x7f0000000180)='fou\x00', 0x40, 0x12a, &(0x7f0000000380)={0x5, 0x8000000000000000, 0x1, 0x8000000000000001}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) 15:09:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:23 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x7, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000540)='GPL\x00', 0x1, 0xec, &(0x7f0000000580)=""/236, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0xfffffff9, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[0x1, 0x1, 0x1, 0x1, 0x1]}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x1e, 0x2, 0x5, 0x8001, 0x10, 0x1, 0x7b5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x5}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x1, 0x7f, 0x8001, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0xf, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x12f2}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5d}, @generic={0x9, 0x4, 0x5, 0x9, 0x978}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x0, 0x1, 0xc, 0x8, 0x3, 0x30, 0xfffffffffffffffc}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @exit]}, &(0x7f0000000240)='GPL\x00', 0xfffffe00, 0xec, &(0x7f0000000380)=""/236, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0xe, 0xffffffff, 0xffff}, 0x10, 0x26300, r0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0x1]}, 0x80) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x9, @empty, 0x200}, r8}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) 15:09:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x19c, r2, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x48000000}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "915a0c6b39c2e39dabe2d244a57ee59c77c8015dfe9e723bfc3414a9"}}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7fff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x59e}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x50, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xef77}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xec61}]}]}, @TIPC_NLA_SOCK={0x88, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xf0000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x101}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x800}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:09:23 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r1, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x32}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4080}, 0x48011) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x5}}, 0xfffffef4) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200), r0) 15:09:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x19c, r2, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x48000000}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "915a0c6b39c2e39dabe2d244a57ee59c77c8015dfe9e723bfc3414a9"}}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7fff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x59e}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x50, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xef77}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xec61}]}]}, @TIPC_NLA_SOCK={0x88, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xf0000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x101}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x800}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:09:24 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x410000, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x674682, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_STATION(r3, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, r4, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_STA_TX_POWER={0x6}, @NL80211_ATTR_REASON_CODE={0x6}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x4}, @NL80211_ATTR_STA_WME={0x4}]}, 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000540)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_START_NAN(r2, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x38, r4, 0x200, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x9e0, 0x10}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x1}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000002100), 0xffffffffffffffff) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r8, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r9, 0x19731f61430f9147}, 0x14}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="a75686", @ANYRES16=r9, @ANYBLOB="000127bd7000ffdbdf2505000000050012000700000014000800766c616e3000000000000000000000000500130004000000"], 0x38}}, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f00000042c0)={0x0, 0x0, &(0x7f0000004280)={&(0x7f0000004180)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48200}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012dbd7000fbdbdf25250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=0x0, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x4d890) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f00000003c0)={'\x00', 0x0, 0x2, 0x2}) ioctl$PTP_SYS_OFFSET(0xffffffffffffffff, 0x43403d05, &(0x7f0000000080)={0x1}) 15:09:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) 15:09:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x19c, r2, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x48000000}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "915a0c6b39c2e39dabe2d244a57ee59c77c8015dfe9e723bfc3414a9"}}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7fff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x59e}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0x50, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xef77}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xec61}]}]}, @TIPC_NLA_SOCK={0x88, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xf0000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffff8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x101}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x800}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x19c}, 0x1, 0x0, 0x0, 0x1}, 0x1) 15:09:24 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x7, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000540)='GPL\x00', 0x1, 0xec, &(0x7f0000000580)=""/236, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0xfffffff9, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[0x1, 0x1, 0x1, 0x1, 0x1]}, 0x80) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x1e, 0x2, 0x5, 0x8001, 0x10, 0x1, 0x7b5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x5}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x1, 0x7f, 0x8001, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0xf, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x12f2}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5d}, @generic={0x9, 0x4, 0x5, 0x9, 0x978}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x0, 0x1, 0xc, 0x8, 0x3, 0x30, 0xfffffffffffffffc}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @exit]}, &(0x7f0000000240)='GPL\x00', 0xfffffe00, 0xec, &(0x7f0000000380)=""/236, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0xe, 0xffffffff, 0xffff}, 0x10, 0x26300, r0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0x1]}, 0x80) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x9, @empty, 0x200}, r8}}, 0x38) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000680)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0xffffffffffffff7b) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000006c0)=[{0x0, 0x0, [0xc7, 0x1, 0x0, 0x0, 0x2, 0xff, 0x2, 0x2, 0x6, 0x7ee, 0x1, 0x1, 0x1000, 0xfffffffc, 0x7f, 0x20]}, {0x10, 0x0, [0x8, 0x228f, 0x33d7, 0xa97, 0x3, 0x9, 0xfffffdce, 0x20, 0x5d, 0x38, 0x1, 0x3, 0x0, 0x80000001, 0x3, 0x5]}, {0x0, 0x0, [0x4, 0x8, 0x8, 0xfffffff7, 0x1ff, 0x10000, 0x1000, 0x8, 0x3, 0x7fff, 0x5, 0x9, 0x800, 0x8, 0x4]}, {0x0, 0x0, [0xfffffffe, 0x5, 0xd6, 0x0, 0x8, 0x3, 0x5, 0x3ff, 0xfffffff7, 0x7fffffff, 0x6, 0x5, 0x1f, 0x1, 0x8, 0x2]}], r1, 0x1, 0x1, 0x120}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000640)={0x1, 0x10, 0xfa00, {&(0x7f0000000600), r9}}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000001c0)={&(0x7f0000000100)="c056f1e509bc344e35b65677104f76abdbcdc26db1cf6a0bcd8d07acd94e61467d11acee917ca8e0df0e4c39f9b2592bb44faf038662674c96ded98552ab2ad813e176087463e53b563a98001f772c094b17e76f5e1afebe3f4ced9f8b455ffcf7fb85d0f9fbf5e0045cddb7aa84b302f0c41402804fdb66cd875ca0", &(0x7f0000000180)=""/56, &(0x7f0000000300)="e23dc796bafb772bd13a6f776ee550c002ec088f68d846ebfc3afb222d9282875d74448711eda1eda110cf19bc8d9c701ccba73241c4c35a4ecfb47122e657d696c467b74354cb6b4f8a9b3c19e4e8573679aeb7a078d34acca2e637db415cface4e0e51e1d349fbdf8f8684e4f308264ad779d73351981e967e78ace7d135a33347124fd8c45fe2311afa287a41cca21c8ee0fc66c3e96e58e653075b60ce5279615994f4d0d76e0e587f2cff04ad1b6a2fd0dc1bce8588a9069565", &(0x7f00000003c0)="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", 0xe, 0xffffffffffffffff, 0x4}, 0x38) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x1, {0xa, 0x4e23, 0xffffffff, @empty, 0x4}, r1}}, 0x38) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000580)={0x2, 0x1}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x9e8, @local, 0x5}, {0xa, 0x4e21, 0x9, @empty, 0x7fffffff}, r1, 0x401}}, 0x48) 15:09:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, '\x00', "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) (async) 15:09:24 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0xffffff28) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r6, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x106, 0x5}}, 0x20) 15:09:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000300)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xb}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {&(0x7f0000000340), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000840)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000800)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000880)={0xf, 0x8, 0xfa00, {r4, 0xa}}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={&(0x7f0000000080)="0745f0b0854faa8f3cfc40c8f967c710552e11f44e2e8a5a113df04f104fa322b971fff55d3fb1cae08ef954aabdea33389f421b933d298045", &(0x7f00000000c0)=""/6, &(0x7f0000000580)="09d2ddf6648cb3bb7765ceffc92a164f14e07c0825f44a3d3b7305fea3b2c453eea320a302f111350c1bb420ab7ff70560bbc50d", &(0x7f00000005c0)="32cf7401e6b7397f5ba8b9f602038dc4c6b4d02c2ea498de5f5ee79fa1801031037c426faeea3743d68542be914fdadbe934f4ceecb599e35189ca245414f74b8cdb534d0d8cae968a319e5ca83d4be52d3a482c8563c698483c951b5f0a2c48713a86224eafb652117b31f2417131bb56363c2e3a6fce222c671e06dc05432684a717bcfc5d720670511267404478fc2077bf6f301d387b73e0a4a93d01ae0c8c0d6789fa41f5a9f0536cf7500ad68d86acb709e6cfecb8135c00c19b", 0xf231}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000006c0)={0x15, 0x110, 0xfa00, {r2, 0x10001, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x6, @loopback, 0xfff}, @in={0x2, 0x4e23, @multicast2}}}, 0x118) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000008c0), 0x2, 0x0) 15:09:24 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x7, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}, [@map_idx_val={0x18, 0xa, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000540)='GPL\x00', 0x1, 0xec, &(0x7f0000000580)=""/236, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0xfffffff9, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[0x1, 0x1, 0x1, 0x1, 0x1]}, 0x80) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x1e, 0x2, 0x5, 0x8001, 0x10, 0x1, 0x7b5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x5}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x1, 0x7f, 0x8001, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0xf, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x12f2}, [@map_idx={0x18, 0xa, 0x5, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5d}, @generic={0x9, 0x4, 0x5, 0x9, 0x978}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @alu={0x0, 0x1, 0xc, 0x8, 0x3, 0x30, 0xfffffffffffffffc}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @exit]}, &(0x7f0000000240)='GPL\x00', 0xfffffe00, 0xec, &(0x7f0000000380)=""/236, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0xe, 0xffffffff, 0xffff}, 0x10, 0x26300, r0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0x1]}, 0x80) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e21, 0x9, @empty, 0x200}, r8}}, 0x38) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 15:09:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:24 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) 15:09:24 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r0, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) 15:09:24 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000680)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0xffffffffffffff7b) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000006c0)=[{0x0, 0x0, [0xc7, 0x1, 0x0, 0x0, 0x2, 0xff, 0x2, 0x2, 0x6, 0x7ee, 0x1, 0x1, 0x1000, 0xfffffffc, 0x7f, 0x20]}, {0x10, 0x0, [0x8, 0x228f, 0x33d7, 0xa97, 0x3, 0x9, 0xfffffdce, 0x20, 0x5d, 0x38, 0x1, 0x3, 0x0, 0x80000001, 0x3, 0x5]}, {0x0, 0x0, [0x4, 0x8, 0x8, 0xfffffff7, 0x1ff, 0x10000, 0x1000, 0x8, 0x3, 0x7fff, 0x5, 0x9, 0x800, 0x8, 0x4]}, {0x0, 0x0, [0xfffffffe, 0x5, 0xd6, 0x0, 0x8, 0x3, 0x5, 0x3ff, 0xfffffff7, 0x7fffffff, 0x6, 0x5, 0x1f, 0x1, 0x8, 0x2]}], r1, 0x1, 0x1, 0x120}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000640)={0x1, 0x10, 0xfa00, {&(0x7f0000000600), r9}}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000001c0)={&(0x7f0000000100)="c056f1e509bc344e35b65677104f76abdbcdc26db1cf6a0bcd8d07acd94e61467d11acee917ca8e0df0e4c39f9b2592bb44faf038662674c96ded98552ab2ad813e176087463e53b563a98001f772c094b17e76f5e1afebe3f4ced9f8b455ffcf7fb85d0f9fbf5e0045cddb7aa84b302f0c41402804fdb66cd875ca0", &(0x7f0000000180)=""/56, &(0x7f0000000300)="e23dc796bafb772bd13a6f776ee550c002ec088f68d846ebfc3afb222d9282875d74448711eda1eda110cf19bc8d9c701ccba73241c4c35a4ecfb47122e657d696c467b74354cb6b4f8a9b3c19e4e8573679aeb7a078d34acca2e637db415cface4e0e51e1d349fbdf8f8684e4f308264ad779d73351981e967e78ace7d135a33347124fd8c45fe2311afa287a41cca21c8ee0fc66c3e96e58e653075b60ce5279615994f4d0d76e0e587f2cff04ad1b6a2fd0dc1bce8588a9069565", &(0x7f00000003c0)="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", 0xe, 0xffffffffffffffff, 0x4}, 0x38) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x1, {0xa, 0x4e23, 0xffffffff, @empty, 0x4}, r1}}, 0x38) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000580)={0x2, 0x1}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x9e8, @local, 0x5}, {0xa, 0x4e21, 0x9, @empty, 0x7fffffff}, r1, 0x401}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000680)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0xffffffffffffff7b) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000006c0)=[{0x0, 0x0, [0xc7, 0x1, 0x0, 0x0, 0x2, 0xff, 0x2, 0x2, 0x6, 0x7ee, 0x1, 0x1, 0x1000, 0xfffffffc, 0x7f, 0x20]}, {0x10, 0x0, [0x8, 0x228f, 0x33d7, 0xa97, 0x3, 0x9, 0xfffffdce, 0x20, 0x5d, 0x38, 0x1, 0x3, 0x0, 0x80000001, 0x3, 0x5]}, {0x0, 0x0, [0x4, 0x8, 0x8, 0xfffffff7, 0x1ff, 0x10000, 0x1000, 0x8, 0x3, 0x7fff, 0x5, 0x9, 0x800, 0x8, 0x4]}, {0x0, 0x0, [0xfffffffe, 0x5, 0xd6, 0x0, 0x8, 0x3, 0x5, 0x3ff, 0xfffffff7, 0x7fffffff, 0x6, 0x5, 0x1f, 0x1, 0x8, 0x2]}], r1, 0x1, 0x1, 0x120}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000640)={0x1, 0x10, 0xfa00, {&(0x7f0000000600), r9}}, 0x18) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000001c0)={&(0x7f0000000100)="c056f1e509bc344e35b65677104f76abdbcdc26db1cf6a0bcd8d07acd94e61467d11acee917ca8e0df0e4c39f9b2592bb44faf038662674c96ded98552ab2ad813e176087463e53b563a98001f772c094b17e76f5e1afebe3f4ced9f8b455ffcf7fb85d0f9fbf5e0045cddb7aa84b302f0c41402804fdb66cd875ca0", &(0x7f0000000180)=""/56, &(0x7f0000000300)="e23dc796bafb772bd13a6f776ee550c002ec088f68d846ebfc3afb222d9282875d74448711eda1eda110cf19bc8d9c701ccba73241c4c35a4ecfb47122e657d696c467b74354cb6b4f8a9b3c19e4e8573679aeb7a078d34acca2e637db415cface4e0e51e1d349fbdf8f8684e4f308264ad779d73351981e967e78ace7d135a33347124fd8c45fe2311afa287a41cca21c8ee0fc66c3e96e58e653075b60ce5279615994f4d0d76e0e587f2cff04ad1b6a2fd0dc1bce8588a9069565", &(0x7f00000003c0)="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", 0xe, 0xffffffffffffffff, 0x4}, 0x38) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x1, {0xa, 0x4e23, 0xffffffff, @empty, 0x4}, r1}}, 0x38) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000580)={0x2, 0x1}) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x9e8, @local, 0x5}, {0xa, 0x4e21, 0x9, @empty, 0x7fffffff}, r1, 0x401}}, 0x48) (async) 15:09:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @private0, 0x3}, r1}}, 0x30) 15:09:24 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r0, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) 15:09:25 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0xffffff28) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r6, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x106, 0x5}}, 0x20) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0xffffff28) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r6, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x106, 0x5}}, 0x20) (async) 15:09:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:25 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) 15:09:25 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r0, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r0, 0x2}}, 0x10) 15:09:25 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @private0, 0x3}, r1}}, 0x30) 15:09:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000680)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x1}}, 0xffffffffffffff7b) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r8, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000006c0)=[{0x0, 0x0, [0xc7, 0x1, 0x0, 0x0, 0x2, 0xff, 0x2, 0x2, 0x6, 0x7ee, 0x1, 0x1, 0x1000, 0xfffffffc, 0x7f, 0x20]}, {0x10, 0x0, [0x8, 0x228f, 0x33d7, 0xa97, 0x3, 0x9, 0xfffffdce, 0x20, 0x5d, 0x38, 0x1, 0x3, 0x0, 0x80000001, 0x3, 0x5]}, {0x0, 0x0, [0x4, 0x8, 0x8, 0xfffffff7, 0x1ff, 0x10000, 0x1000, 0x8, 0x3, 0x7fff, 0x5, 0x9, 0x800, 0x8, 0x4]}, {0x0, 0x0, [0xfffffffe, 0x5, 0xd6, 0x0, 0x8, 0x3, 0x5, 0x3ff, 0xfffffff7, 0x7fffffff, 0x6, 0x5, 0x1f, 0x1, 0x8, 0x2]}], r1, 0x1, 0x1, 0x120}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000640)={0x1, 0x10, 0xfa00, {&(0x7f0000000600), r9}}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000001c0)={&(0x7f0000000100)="c056f1e509bc344e35b65677104f76abdbcdc26db1cf6a0bcd8d07acd94e61467d11acee917ca8e0df0e4c39f9b2592bb44faf038662674c96ded98552ab2ad813e176087463e53b563a98001f772c094b17e76f5e1afebe3f4ced9f8b455ffcf7fb85d0f9fbf5e0045cddb7aa84b302f0c41402804fdb66cd875ca0", &(0x7f0000000180)=""/56, &(0x7f0000000300)="e23dc796bafb772bd13a6f776ee550c002ec088f68d846ebfc3afb222d9282875d74448711eda1eda110cf19bc8d9c701ccba73241c4c35a4ecfb47122e657d696c467b74354cb6b4f8a9b3c19e4e8573679aeb7a078d34acca2e637db415cface4e0e51e1d349fbdf8f8684e4f308264ad779d73351981e967e78ace7d135a33347124fd8c45fe2311afa287a41cca21c8ee0fc66c3e96e58e653075b60ce5279615994f4d0d76e0e587f2cff04ad1b6a2fd0dc1bce8588a9069565", &(0x7f00000003c0)="19010c7e8e49830f4ce85ebbe0a10388fb0f5e74ef39b8e39a07640c712df5ea8affd70bed062f6de3921609e2bd127b6d97e8adca3094e4f28492200f79594c97a0d3d24fc2c4712496ff82974db855e97700b7f1bb0906f15e3cc51ec91acedfc4033e6dbf62576c6ec9c96d1fa5d6154aaa602a5fe7554e849a7fda662326d1a044c19f2b2ff25525daaf67314579545a36032915b640599f9926e5d793c4a5a9c30e47d38376eb6e3dde250f6252a8cf0d632b7d6ed664d399d0df767c4741de1c31a2b38d407cdfd84bb741a80a80bd00e1c46e41aea8b4a16b33ac473f3b71ac7a9e0468fd38d98fb4b8ec3d1100eeebe732b6d29e17c5b6", 0xe, 0xffffffffffffffff, 0x4}, 0x38) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x1, {0xa, 0x4e23, 0xffffffff, @empty, 0x4}, r1}}, 0x38) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000580)={0x2, 0x1}) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f0000000500)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x9e8, @local, 0x5}, {0xa, 0x4e21, 0x9, @empty, 0x7fffffff}, r1, 0x401}}, 0x48) 15:09:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r1, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:25 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0xffffff28) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r6, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x106, 0x5}}, 0x20) 15:09:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:25 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) 15:09:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:25 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0xffffff28) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r6, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x106, 0x5}}, 0x20) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x2}}, 0xffffff28) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r6, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x106, 0x5}}, 0x20) (async) 15:09:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x7}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000000c0), r4, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "000400", "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"}}, 0x110) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:25 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0xfffffffffffffffc, 0x6d) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x800012e7}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x0, {0xa, 0x4e20, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}}, 0x38) 15:09:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "000400", "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"}}, 0x110) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x106, 0x6}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:25 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "000400", "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"}}, 0x110) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:26 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0xffffff28) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r6, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x106, 0x5}}, 0x20) 15:09:26 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0xfffffffffffffffc, 0x6d) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x800012e7}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x0, {0xa, 0x4e20, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}}, 0x38) 15:09:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x7}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000000c0), r4, 0x0, 0x0, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x88, 0x3, 0x7fff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0x1000}, 0x8) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) 15:09:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x6, 0x8, 0x7, 0x0, 0x1900, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x48) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r0, &(0x7f00000004c0)="1a0041cecd2139deb8028ffd233efba84111431f6bc065cfc289fac2e5d28fdea9c6e8dab6601acb19530e7654cf9cecc8262206347559cbb1cb663a8ee537333a43bb74d700afb535fc1f61532f240ac52ec45b3ab5dfb4fc7f501c7dcd966c02f710dd42b12775332097c551601117b753d039a37a7b09c756b072a87f7abd76dc73d58972ce82faa2a576323a7245f717e34f1cb2c602486d44f522da9e5175235b55c6d21ff4b30cf57abbea7f4ce5970e4cbcf54af1486be74f09a1e8fe2f2547e5fe84bf3d6e7c7099f7a80aea7702d03c1b081156364ee4e72f6da42a2aafc36b4e63a58f486c79a26bf6d2dd75e3", &(0x7f00000005c0)=@udp=r1, 0x4}, 0x20) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000007c0)=ANY=[@ANYBLOB="5000000067c3b4c0aab719580ce2611f60a1ade21dcde2c6684d1cf954ea5ad15bfe22eaf33133d76960c264824d84cdd7efe6602187f8733da286929346e3bbee8121f50bda94617666ecf6adae0a94ac12d166cbac10eb56c15470bfea5c87c0046a98edd85e54841afa95b4a31bf35c996d9773aa9b0b7c2b5f98f98e0e95fa002fdb62ba1563dab1391ff470e5b98b35560cdf38e2e42865e2ab1a54dce9cb726fe5159d1e184e92c6a925f9adf9f221ed40253bee576eff86ee2f41ecf6c18e12438d72ae9fa8523a", @ANYRES16=r2, @ANYBLOB="020026bd7000fddbdf250100000005002200010000000500120020000000060001000e00000006001d000010000006001b004e23000014001f0000000000000000000000ffffe0000002"], 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4000815) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000680)={0x8, 0x120, 0xfa00, {0x2, {0x3, 0x8, "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", 0x31, 0x8, 0x8, 0xd6, 0x81, 0x80, 0x2a, 0x1}, r7}}, 0x128) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r9, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e20, @multicast2}}}, 0x90) r10 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$PTP_CLOCK_GETCAPS(r10, 0x80503d01, &(0x7f0000000300)) 15:09:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x88, 0x3, 0x7fff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0x1000}, 0x8) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) (async) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x88, 0x3, 0x7fff}) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0x1000}, 0x8) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) (async) 15:09:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x7}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000000c0), r4, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000), 0x2, 0x7}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f00000000c0), r4, 0x0, 0x0, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) (async) 15:09:26 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0xa}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0xfffffffffffffffc, 0x6d) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x800012e7}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x0, {0xa, 0x4e20, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7}}}, 0x38) (rerun: 32) 15:09:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:26 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0xffffff28) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r6, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x106, 0x5}}, 0x20) 15:09:26 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$PTP_PIN_GETFUNC(r1, 0xc0603d06, &(0x7f0000000080)={'\x00', 0x88, 0x3, 0x7fff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0x1000}, 0x8) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) 15:09:26 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:26 executing program 0: write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x800}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x6, 0x8, 0x7, 0x0, 0x1900, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x48) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, 0x0) (async, rerun: 64) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r0, &(0x7f00000004c0)="1a0041cecd2139deb8028ffd233efba84111431f6bc065cfc289fac2e5d28fdea9c6e8dab6601acb19530e7654cf9cecc8262206347559cbb1cb663a8ee537333a43bb74d700afb535fc1f61532f240ac52ec45b3ab5dfb4fc7f501c7dcd966c02f710dd42b12775332097c551601117b753d039a37a7b09c756b072a87f7abd76dc73d58972ce82faa2a576323a7245f717e34f1cb2c602486d44f522da9e5175235b55c6d21ff4b30cf57abbea7f4ce5970e4cbcf54af1486be74f09a1e8fe2f2547e5fe84bf3d6e7c7099f7a80aea7702d03c1b081156364ee4e72f6da42a2aafc36b4e63a58f486c79a26bf6d2dd75e3", &(0x7f00000005c0)=@udp=r1, 0x4}, 0x20) (async, rerun: 64) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000007c0)=ANY=[@ANYBLOB="5000000067c3b4c0aab719580ce2611f60a1ade21dcde2c6684d1cf954ea5ad15bfe22eaf33133d76960c264824d84cdd7efe6602187f8733da286929346e3bbee8121f50bda94617666ecf6adae0a94ac12d166cbac10eb56c15470bfea5c87c0046a98edd85e54841afa95b4a31bf35c996d9773aa9b0b7c2b5f98f98e0e95fa002fdb62ba1563dab1391ff470e5b98b35560cdf38e2e42865e2ab1a54dce9cb726fe5159d1e184e92c6a925f9adf9f221ed40253bee576eff86ee2f41ecf6c18e12438d72ae9fa8523a", @ANYRES16=r2, @ANYBLOB="020026bd7000fddbdf250100000005002200010000000500120020000000060001000e00000006001d000010000006001b004e23000014001f0000000000000000000000ffffe0000002"], 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4000815) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000680)={0x8, 0x120, 0xfa00, {0x2, {0x3, 0x8, "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", 0x31, 0x8, 0x8, 0xd6, 0x81, 0x80, 0x2a, 0x1}, r7}}, 0x128) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r9, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e20, @multicast2}}}, 0x90) r10 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$PTP_CLOCK_GETCAPS(r10, 0x80503d01, &(0x7f0000000300)) 15:09:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000080)="7730bb4fba5f814c15fef0b2bece5fab8e9cabcde044186934ec6e47afcc8704aa4fc074d0cf0e9682c3d7692f7c635cbbd2a1fa8b62c25448c4ed0e0ae755214ca1ad366224a298d33b2e845e", &(0x7f0000000000)=""/36, 0x4}, 0x20) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000140)='cpu.pressure\x00', 0x2, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f00000001c0)='GPL\x00', 0x8, 0x28, &(0x7f0000000200)=""/40, 0x41100, 0x9, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x3, 0xff, 0x1}, 0x10, 0x19b2, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000440)={r2, 0x1}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:27 executing program 0: write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x800}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x800}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) 15:09:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000080)="7730bb4fba5f814c15fef0b2bece5fab8e9cabcde044186934ec6e47afcc8704aa4fc074d0cf0e9682c3d7692f7c635cbbd2a1fa8b62c25448c4ed0e0ae755214ca1ad366224a298d33b2e845e", &(0x7f0000000000)=""/36, 0x4}, 0x20) (async) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000140)='cpu.pressure\x00', 0x2, 0x0) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f00000001c0)='GPL\x00', 0x8, 0x28, &(0x7f0000000200)=""/40, 0x41100, 0x9, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x3, 0xff, 0x1}, 0x10, 0x19b2, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000440)={r2, 0x1}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000500)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000580)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e24, @local}}}, 0x90) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, 0xffffffffffffffff, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) 15:09:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000080)="7730bb4fba5f814c15fef0b2bece5fab8e9cabcde044186934ec6e47afcc8704aa4fc074d0cf0e9682c3d7692f7c635cbbd2a1fa8b62c25448c4ed0e0ae755214ca1ad366224a298d33b2e845e", &(0x7f0000000000)=""/36, 0x4}, 0x20) (async) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000140)='cpu.pressure\x00', 0x2, 0x0) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f00000001c0)='GPL\x00', 0x8, 0x28, &(0x7f0000000200)=""/40, 0x41100, 0x9, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x3, 0xff, 0x1}, 0x10, 0x19b2, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000440)={r2, 0x1}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:27 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0xffffff28) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r6, 0x9}}, 0x10) 15:09:27 executing program 0: write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x800}}, 0x18) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4000000000000, &(0x7f0000000240)={0xffffffffffffffff}, 0x2c, 0x2}}, 0xfffffffffffffe66) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r4, 0x0, 0x1, 0x4}}, 0x20) 15:09:27 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000500)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000580)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e24, @local}}}, 0x90) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x2, 0x4}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000500), 0x2, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000580)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e24, @local}}}, 0x90) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xc}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x6, 0x8, 0x7, 0x0, 0x1900, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x48) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, 0x0) (async) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r0, &(0x7f00000004c0)="1a0041cecd2139deb8028ffd233efba84111431f6bc065cfc289fac2e5d28fdea9c6e8dab6601acb19530e7654cf9cecc8262206347559cbb1cb663a8ee537333a43bb74d700afb535fc1f61532f240ac52ec45b3ab5dfb4fc7f501c7dcd966c02f710dd42b12775332097c551601117b753d039a37a7b09c756b072a87f7abd76dc73d58972ce82faa2a576323a7245f717e34f1cb2c602486d44f522da9e5175235b55c6d21ff4b30cf57abbea7f4ce5970e4cbcf54af1486be74f09a1e8fe2f2547e5fe84bf3d6e7c7099f7a80aea7702d03c1b081156364ee4e72f6da42a2aafc36b4e63a58f486c79a26bf6d2dd75e3", &(0x7f00000005c0)=@udp=r1, 0x4}, 0x20) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000007c0)=ANY=[@ANYBLOB="5000000067c3b4c0aab719580ce2611f60a1ade21dcde2c6684d1cf954ea5ad15bfe22eaf33133d76960c264824d84cdd7efe6602187f8733da286929346e3bbee8121f50bda94617666ecf6adae0a94ac12d166cbac10eb56c15470bfea5c87c0046a98edd85e54841afa95b4a31bf35c996d9773aa9b0b7c2b5f98f98e0e95fa002fdb62ba1563dab1391ff470e5b98b35560cdf38e2e42865e2ab1a54dce9cb726fe5159d1e184e92c6a925f9adf9f221ed40253bee576eff86ee2f41ecf6c18e12438d72ae9fa8523a", @ANYRES16=r2, @ANYBLOB="020026bd7000fddbdf250100000005002200010000000500120020000000060001000e00000006001d000010000006001b004e23000014001f0000000000000000000000ffffe0000002"], 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4000815) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r7}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000680)={0x8, 0x120, 0xfa00, {0x2, {0x3, 0x8, "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", 0x31, 0x8, 0x8, 0xd6, 0x81, 0x80, 0x2a, 0x1}, r7}}, 0x128) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r9, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e20, @multicast2}}}, 0x90) r10 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$PTP_CLOCK_GETCAPS(r10, 0x80503d01, &(0x7f0000000300)) 15:09:27 executing program 0: socketpair(0x25, 0x3, 0x5, &(0x7f0000000080)) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, &(0x7f0000000500), 0x3, 0x0, &(0x7f00000006c0)=[{0x0, 0x80000000}, {}, {}], 0x1, 0x0, &(0x7f0000000200)=[{}]}) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f00000007c0)={{0x80000000, 0x0, 0x6, [0x6, 0x3]}, {0x80000000, 0x0, 0x4, [0x0, 0xe6c]}, 0x0, [0x5, 0x4]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000000)={0x2}) r4 = syz_open_dev$media(&(0x7f0000000300), 0xf9, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r4, 0xc0287c02, &(0x7f0000000400)={r0, &(0x7f0000000340), &(0x7f0000000380)}) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000440)={0x2, 0x8}) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r2, 0x9, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e24, 0x10000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}}}, 0x118) 15:09:27 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:27 executing program 0: socketpair(0x25, 0x3, 0x5, &(0x7f0000000080)) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, &(0x7f0000000500), 0x3, 0x0, &(0x7f00000006c0)=[{0x0, 0x80000000}, {}, {}], 0x1, 0x0, &(0x7f0000000200)=[{}]}) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f00000007c0)={{0x80000000, 0x0, 0x6, [0x6, 0x3]}, {0x80000000, 0x0, 0x4, [0x0, 0xe6c]}, 0x0, [0x5, 0x4]}) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) (async) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000000)={0x2}) (async) r4 = syz_open_dev$media(&(0x7f0000000300), 0xf9, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r4, 0xc0287c02, &(0x7f0000000400)={r0, &(0x7f0000000340), &(0x7f0000000380)}) (async) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000440)={0x2, 0x8}) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r2, 0x9, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e24, 0x10000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}}}, 0x118) 15:09:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000500)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000580)={0x5, 0x10, 0xfa00, {&(0x7f0000000300), r5}}, 0x18) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e24, @local}}}, 0x90) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xc}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4000000000000, &(0x7f0000000240)={0xffffffffffffffff}, 0x2c, 0x2}}, 0xfffffffffffffe66) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r4, 0x0, 0x1, 0x4}}, 0x20) 15:09:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:28 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0xffffff28) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r6}}, 0x20) 15:09:28 executing program 0: socketpair(0x25, 0x3, 0x5, &(0x7f0000000080)) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, &(0x7f0000000500), 0x3, 0x0, &(0x7f00000006c0)=[{0x0, 0x80000000}, {}, {}], 0x1, 0x0, &(0x7f0000000200)=[{}]}) (async) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f00000007c0)={{0x80000000, 0x0, 0x6, [0x6, 0x3]}, {0x80000000, 0x0, 0x4, [0x0, 0xe6c]}, 0x0, [0x5, 0x4]}) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000000)={0x2}) (async) r4 = syz_open_dev$media(&(0x7f0000000300), 0xf9, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r4, 0xc0287c02, &(0x7f0000000400)={r0, &(0x7f0000000340), &(0x7f0000000380)}) (async) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000440)={0x2, 0x8}) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r2, 0x9, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e24, 0x10000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}}}, 0x118) 15:09:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0x1, &(0x7f0000000000)="626ca48f4781002647a79abd09445914e09b354da16e21629a4d7b5391f257f97d", &(0x7f0000000080)=""/239}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x6461af5e26ce37e7, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x8001, 0x81, "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", 0x0, 0x1f, 0x2, 0x7, 0x2, 0x4}, r3}}, 0x128) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000380)={0x1, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), 0xffffffffffffffff) 15:09:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:28 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0x1, &(0x7f0000000000)="626ca48f4781002647a79abd09445914e09b354da16e21629a4d7b5391f257f97d", &(0x7f0000000080)=""/239}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4000000000000, &(0x7f0000000240)={0xffffffffffffffff}, 0x2c, 0x2}}, 0xfffffffffffffe66) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000002740)={0xe, 0x18, 0xfa00, @ib_path={0x0, r4}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r4, 0x0, 0x1, 0x4}}, 0x20) 15:09:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x6461af5e26ce37e7, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x8001, 0x81, "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", 0x0, 0x1f, 0x2, 0x7, 0x2, 0x4}, r3}}, 0x128) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000380)={0x1, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), 0xffffffffffffffff) 15:09:29 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0xffffff28) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) 15:09:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x0) 15:09:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0x1, &(0x7f0000000000)="626ca48f4781002647a79abd09445914e09b354da16e21629a4d7b5391f257f97d", &(0x7f0000000080)=""/239}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0x1, &(0x7f0000000000)="626ca48f4781002647a79abd09445914e09b354da16e21629a4d7b5391f257f97d", &(0x7f0000000080)=""/239}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 15:09:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e24, @remote}}}, 0x90) 15:09:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x6461af5e26ce37e7, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x8001, 0x81, "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", 0x0, 0x1f, 0x2, 0x7, 0x2, 0x4}, r3}}, 0x128) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000380)={0x1, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), 0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x6461af5e26ce37e7, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x8001, 0x81, "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", 0x0, 0x1f, 0x2, 0x7, 0x2, 0x4}, r3}}, 0x128) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000380)={0x1, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), 0xffffffffffffffff) (async) 15:09:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e24, @remote}}}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e24, @remote}}}, 0x90) (async) 15:09:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x0) 15:09:29 executing program 3: membarrier(0x8, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000000)={0x7ff, 0xfffffbff, 0x200}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000080)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e24, @remote}}}, 0x90) 15:09:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:29 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r0, 0x20, 0x70bd29, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7f}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}]}, 0x54}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0xffffff28) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000002700)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000026c0), 0x111}}, 0x20) 15:09:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2}}, 0x0) 15:09:29 executing program 3: membarrier(0x8, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000000)={0x7ff, 0xfffffbff, 0x200}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x8, 0xfa00, {0x2000000000000000, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0xffffffc1, @loopback, 0x7fffffff}, {0xa, 0x4e22, 0xc1ea, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xff}, 0xffffffffffffffff, 0x1000}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 15:09:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x1, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) 15:09:29 executing program 3: membarrier(0x8, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000000)={0x7ff, 0xfffffbff, 0x200}) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 15:09:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "ddbf54bef11269c6163a6ce4c34069d871c9314a612c5fa85d37468f3b74d222b96c7204576f09fe9d31eae9b76cd1021490501a46b0cf991db9230701fb678b7bade66385bc712709c9812ec906e99288388feba2fed021121cee91b032d8d5634cdaf212f33afcaa5e056d3ddc21f7229177f7bd7cc575f25deaa769d89a5689b8be63a31bc9575c5248ef4cefe764b650a203782e41b7bd0a3e84b4d0355a3648f59d2fb7d19ba30177710103de3507e2b22093b6a818cdbf2eb5287b9d4c370b8e8324485faba00bbaa96b19176f033432c4539c56b52d37d2af6468bcb75ae8858f73ddf62df4989967f66cd5a48812874cf849b32d9088f4ee438ab98b"}}, 0x110) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4000000000000004, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000300)={0xf, 0x8, 0xfa00, {r5, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000080)={0x9, 0x108, 0xfa00, {r1, 0x1, "174d40", "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"}}, 0x110) 15:09:29 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @empty, 0x506d}, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, '\x00', 0x25}, 0x5}, r1, 0x9}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r1}}, 0x70) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000240)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x1, @mcast1, 0x8}, r1}}, 0x30) 15:09:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "d66882", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x8, 0xfa00, {0x2000000000000000, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) 15:09:29 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0x26}, 0x2}, {0xa, 0x4e23, 0xa7d, @mcast2, 0x4}, r1, 0x3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) [ 724.699343] ================================================================== [ 724.706922] BUG: KASAN: use-after-free in __list_del_entry_valid+0xd6/0xf0 [ 724.713923] Read of size 8 at addr ffff88809e60e1e0 by task syz-executor.4/16132 [ 724.721495] [ 724.723125] CPU: 1 PID: 16132 Comm: syz-executor.4 Not tainted 4.14.269-syzkaller #0 [ 724.730993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.740322] Call Trace: [ 724.742898] dump_stack+0x1b2/0x281 [ 724.746533] print_address_description.cold+0x54/0x1d3 [ 724.751804] kasan_report_error.cold+0x8a/0x191 [ 724.756474] ? __list_del_entry_valid+0xd6/0xf0 [ 724.761127] __asan_report_load8_noabort+0x68/0x70 [ 724.766138] ? lock_acquire+0x160/0x3f0 [ 724.770101] ? __list_del_entry_valid+0xd6/0xf0 [ 724.774749] __list_del_entry_valid+0xd6/0xf0 [ 724.779497] cma_cancel_operation+0x285/0x950 [ 724.784065] rdma_destroy_id+0x84/0xb60 [ 724.788025] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 724.793123] ucma_close+0x11a/0x340 [ 724.796730] ? ima_file_free+0x4f/0x330 [ 724.800684] ? ucma_query_addr+0x320/0x320 [ 724.804917] __fput+0x25f/0x7a0 [ 724.808187] task_work_run+0x11f/0x190 [ 724.812056] get_signal+0x18a3/0x1ca0 [ 724.815845] ? __might_fault+0x177/0x1b0 [ 724.819888] ? ucma_write+0xf9/0x2c0 [ 724.823581] ? ucma_set_ib_path+0x510/0x510 [ 724.827882] do_signal+0x7c/0x1550 [ 724.831516] ? __vfs_write+0xec/0x630 [ 724.835402] ? ucma_set_ib_path+0x510/0x510 [ 724.839703] ? debug_check_no_obj_freed+0x2c0/0x680 [ 724.844698] ? kernel_read+0x110/0x110 [ 724.848575] ? setup_sigcontext+0x820/0x820 [ 724.852877] ? common_file_perm+0x3ee/0x580 [ 724.857181] ? check_preemption_disabled+0x35/0x240 [ 724.862180] ? kick_process+0xe4/0x170 [ 724.866056] ? task_work_add+0x87/0xe0 [ 724.869935] ? fput_many+0xaf/0x140 [ 724.873548] ? exit_to_usermode_loop+0x41/0x200 [ 724.878205] exit_to_usermode_loop+0x160/0x200 [ 724.882768] do_syscall_64+0x4a3/0x640 [ 724.886636] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 724.891808] RIP: 0033:0x7f7a6acab049 [ 724.895499] RSP: 002b:00007f7a69620168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 724.903209] RAX: fffffffffffffe00 RBX: 00007f7a6adbdf60 RCX: 00007f7a6acab049 [ 724.910461] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 724.917729] RBP: 00007f7a6ad0508d R08: 0000000000000000 R09: 0000000000000000 [ 724.925040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 724.932308] R13: 00007ffdaac858ff R14: 00007f7a69620300 R15: 0000000000022000 [ 724.940207] [ 724.942341] Allocated by task 16166: [ 724.946056] kasan_kmalloc+0xeb/0x160 [ 724.949936] kmem_cache_alloc_trace+0x131/0x3d0 [ 724.954593] rdma_create_id+0x57/0x4c0 [ 724.958480] ucma_create_id+0x18b/0x500 [ 724.962432] ucma_write+0x206/0x2c0 [ 724.966065] __vfs_write+0xe4/0x630 [ 724.969701] vfs_write+0x17f/0x4d0 [ 724.973230] SyS_write+0xf2/0x210 [ 724.976775] do_syscall_64+0x1d5/0x640 [ 724.980651] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 724.985918] [ 724.987525] Freed by task 16158: [ 724.990929] kasan_slab_free+0xc3/0x1a0 [ 724.994901] kfree+0xc9/0x250 [ 724.998007] ucma_close+0x11a/0x340 [ 725.001613] __fput+0x25f/0x7a0 [ 725.004893] task_work_run+0x11f/0x190 [ 725.008787] exit_to_usermode_loop+0x1ad/0x200 [ 725.013354] do_syscall_64+0x4a3/0x640 [ 725.017224] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 725.022401] [ 725.024014] The buggy address belongs to the object at ffff88809e60e000 [ 725.024014] which belongs to the cache kmalloc-1024 of size 1024 [ 725.036822] The buggy address is located 480 bytes inside of [ 725.036822] 1024-byte region [ffff88809e60e000, ffff88809e60e400) [ 725.048758] The buggy address belongs to the page: [ 725.053679] page:ffffea0002798380 count:1 mapcount:0 mapping:ffff88809e60e000 index:0x0 compound_mapcount: 0 [ 725.063626] flags: 0xfff00000008100(slab|head) [ 725.068187] raw: 00fff00000008100 ffff88809e60e000 0000000000000000 0000000100000007 [ 725.076062] raw: ffffea00027597a0 ffffea0002513620 ffff88813fe74ac0 0000000000000000 [ 725.083952] page dumped because: kasan: bad access detected [ 725.089650] [ 725.091257] Memory state around the buggy address: [ 725.096162] ffff88809e60e080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 725.103499] ffff88809e60e100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 725.110834] >ffff88809e60e180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 725.118187] ^ [ 725.125012] ffff88809e60e200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 725.132350] ffff88809e60e280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 725.139688] ================================================================== [ 725.147038] Disabling lock debugging due to kernel taint [ 725.153306] Kernel panic - not syncing: panic_on_warn set ... [ 725.153306] [ 725.160681] CPU: 1 PID: 16132 Comm: syz-executor.4 Tainted: G B 4.14.269-syzkaller #0 [ 725.169764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.179107] Call Trace: [ 725.181688] dump_stack+0x1b2/0x281 [ 725.185321] panic+0x1f9/0x42d [ 725.188501] ? add_taint.cold+0x16/0x16 [ 725.192457] ? ___preempt_schedule+0x16/0x18 [ 725.196847] kasan_end_report+0x43/0x49 [ 725.200820] kasan_report_error.cold+0xa7/0x191 [ 725.205464] ? __list_del_entry_valid+0xd6/0xf0 [ 725.210122] __asan_report_load8_noabort+0x68/0x70 [ 725.215039] ? lock_acquire+0x160/0x3f0 [ 725.218996] ? __list_del_entry_valid+0xd6/0xf0 [ 725.223653] __list_del_entry_valid+0xd6/0xf0 [ 725.228146] cma_cancel_operation+0x285/0x950 [ 725.232619] rdma_destroy_id+0x84/0xb60 [ 725.236569] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 725.241751] ucma_close+0x11a/0x340 [ 725.245357] ? ima_file_free+0x4f/0x330 [ 725.249320] ? ucma_query_addr+0x320/0x320 [ 725.253534] __fput+0x25f/0x7a0 [ 725.256819] task_work_run+0x11f/0x190 [ 725.260711] get_signal+0x18a3/0x1ca0 [ 725.264490] ? __might_fault+0x177/0x1b0 [ 725.268547] ? ucma_write+0xf9/0x2c0 [ 725.272243] ? ucma_set_ib_path+0x510/0x510 [ 725.276539] do_signal+0x7c/0x1550 [ 725.280078] ? __vfs_write+0xec/0x630 [ 725.283863] ? ucma_set_ib_path+0x510/0x510 [ 725.288162] ? debug_check_no_obj_freed+0x2c0/0x680 [ 725.293161] ? kernel_read+0x110/0x110 [ 725.297026] ? setup_sigcontext+0x820/0x820 [ 725.301324] ? common_file_perm+0x3ee/0x580 [ 725.305625] ? check_preemption_disabled+0x35/0x240 [ 725.310633] ? kick_process+0xe4/0x170 [ 725.314497] ? task_work_add+0x87/0xe0 [ 725.318367] ? fput_many+0xaf/0x140 [ 725.321982] ? exit_to_usermode_loop+0x41/0x200 [ 725.326627] exit_to_usermode_loop+0x160/0x200 [ 725.331188] do_syscall_64+0x4a3/0x640 [ 725.335053] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 725.340220] RIP: 0033:0x7f7a6acab049 [ 725.343904] RSP: 002b:00007f7a69620168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 725.351609] RAX: fffffffffffffe00 RBX: 00007f7a6adbdf60 RCX: 00007f7a6acab049 [ 725.358861] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 725.366105] RBP: 00007f7a6ad0508d R08: 0000000000000000 R09: 0000000000000000 [ 725.373347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 725.380603] R13: 00007ffdaac858ff R14: 00007f7a69620300 R15: 0000000000022000 [ 725.387933] Kernel Offset: disabled [ 725.391540] Rebooting in 86400 seconds..