fffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 13:24:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000003c0)={'erspan0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="1d50ccf3f6441fd30000000000000000", @ANYRES32=0x0, @ANYBLOB="0007800000000003000000404cd20030006601001f049078ffffffff0a010101890f1d640101010a0101010000000000820ab242ff32d42342930000"]}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x1, {0x4, 0xffffffff, "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", 0x4, 0x9, 0x6, 0x3f, 0x5, 0x9, 0x2}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x3, 0x5, "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", 0x1, 0xff, 0x0, 0x7, 0x2, 0x6, 0x6}, r1}}, 0x120) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) recvfrom$ax25(r5, &(0x7f0000000540)=""/106, 0x6a, 0x0, &(0x7f00000005c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2}, [@default, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r4, 0x2c, 0x0, @in={0x2, 0x4e21, @local}}}, 0x90) 13:24:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x14, 0xfa00, {0x7, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x1031c3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0x0, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @private1}]}, 0x44}}, 0x8000) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r1, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x14, 0xfa00, {0x7, &(0x7f0000000040), 0x106, 0x6}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x1031c3, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0x0, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @private1}]}, 0x44}}, 0x8000) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r1, 0x5}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:24:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0x1}}, 0x10) 13:24:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000001c0)={r3, 0x2, 0x5, "ab1b79cec6"}) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$sock_SIOCDELRT(r4, 0x890c, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x1}, @generic={0x2c, "611138c6f95482d957cf297fafe5"}, @can={0x1d, r6}, 0x401, 0x0, 0x0, 0x0, 0x400, 0x0, 0x101, 0x4, 0x1}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x9}}, @fwd={0xc}, @typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x3}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xc, 0x3}, {0xe}, {0x6, 0x2}, {0xc, 0x2}]}, @func={0x10, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x2e, 0x0, 0x5f, 0x0, 0x61, 0x5f, 0x2e, 0x0]}}, &(0x7f00000002c0)=""/20, 0xaa, 0x14, 0x1}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e25, 0x800000, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x14, 0xfa00, {0x7, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x1031c3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, 0x0, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @private1}]}, 0x44}}, 0x8000) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r1, 0x5}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r4, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r5, 0x1}}, 0x10) 13:24:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r4, 0x2c, 0x0, @in={0x2, 0x4e21, @local}}}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r4, 0x2c, 0x0, @in={0x2, 0x4e21, @local}}}, 0x90) (async) 13:24:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000001c0)={r3, 0x2, 0x5, "ab1b79cec6"}) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$sock_SIOCDELRT(r4, 0x890c, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x1}, @generic={0x2c, "611138c6f95482d957cf297fafe5"}, @can={0x1d, r6}, 0x401, 0x0, 0x0, 0x0, 0x400, 0x0, 0x101, 0x4, 0x1}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x9}}, @fwd={0xc}, @typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x3}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xc, 0x3}, {0xe}, {0x6, 0x2}, {0xc, 0x2}]}, @func={0x10, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x2e, 0x0, 0x5f, 0x0, 0x61, 0x5f, 0x2e, 0x0]}}, &(0x7f00000002c0)=""/20, 0xaa, 0x14, 0x1}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e25, 0x800000, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000001c0)={r3, 0x2, 0x5, "ab1b79cec6"}) (async) socket$bt_bnep(0x1f, 0x3, 0x4) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) ioctl$sock_SIOCDELRT(r4, 0x890c, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x1}, @generic={0x2c, "611138c6f95482d957cf297fafe5"}, @can={0x1d, r6}, 0x401, 0x0, 0x0, 0x0, 0x400, 0x0, 0x101, 0x4, 0x1}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x9}}, @fwd={0xc}, @typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x3}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xc, 0x3}, {0xe}, {0x6, 0x2}, {0xc, 0x2}]}, @func={0x10, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x2e, 0x0, 0x5f, 0x0, 0x61, 0x5f, 0x2e, 0x0]}}, &(0x7f00000002c0)=""/20, 0xaa, 0x14, 0x1}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e25, 0x800000, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:24:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0x1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x106, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0x1}}, 0x10) (async) 13:24:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000100)=@raw=[@map_idx_val={0x18, 0xc, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000140)='syzkaller\x00', 0xff, 0x72, &(0x7f0000000180)=""/114, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x8, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r2, 0x0, 0x25, 0x9}, 0x10) 13:24:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x7, 0x9, 0x4, @dev={0xfe, 0x80, '\x00', 0xa}, @remote, 0xc83fc0ab5ef5e245, 0x7, 0x6}}) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000001980)={0x1590, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_WOL_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}, @ETHTOOL_A_WOL_MODES={0x1420, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xa7, 0x4, "6cd0134555750d0792b47cacad9ede3f2dfc7ff3ac25eb75f33541c096aa3840cf3c2dc7ccced03b511f368480a3a5ab735391fdfe7f3c2dcb00c76ba307c069ed4f0dc3eb5da50890abc1f27da14754ab0c8d89b92e39124129c5f5930e8bef9f09bd9180c578cd9b374d973e2b3f478b02298032e88314d7a20bafedae7004b08e52b507c3ba008b93a970b93e4a42b0c1b2710b864fcbce99bcbd31847507217271"}, @ETHTOOL_A_BITSET_MASK={0x4b, 0x5, "d5da2251afcb6242c4d6663c36d300974bd07ebb6caf00c2b3583f17614d53d09191b458da2037c571d1ed23267705614a5fc7f6a34dced366a399e4e057a724f859e9fa689930"}, @ETHTOOL_A_BITSET_VALUE={0x10, 0x4, "6c31f1e978a66c7f78342f0f"}, @ETHTOOL_A_BITSET_MASK={0xfd, 0x5, "82954286b2b318a888cd70795ed1d0aee9c417661de9ac667d7d1a426185943c4bb26369a09acbca7b3b78bec5f5731e232c539c900e5dae823dfdd7b24d35ebbc29000e28cb88d2805d106f84e5a763ec3eb5f6a51c14f002098c5deb0fe36a5050baa60f17911fbb8be208eb773f1400a805ae102721e2c38e0f4acb66f12623d270c6b688576e95cc0add3f30f5f979d027b6ecde3db407df7ea98739828690151c1b5ad4e710f4351ddb87f4dee973455236b70ea493e37d6935321861322957d408b0e3eea51cfac4f9b90caa619fe02becf957323fb016190d17516e2948195b8949a478341453a2961d921711c2fc22d7acfc3baa56"}, @ETHTOOL_A_BITSET_VALUE={0x9c, 0x4, "a2a0f691dc51f60f07838e0e95aa45374eb566119b41d751fd8769613a24c95c1115c8f667db0d1ca3715b256a25b41b2a98fc870e6f883adc34e094e08b291733edff44b32003045110d5461849d8100de5c90611ed0d6ff5a293a265e592ed3a1868ea6295835b42ec81fd3983d784d79f921150514757615be853aed6bbb39034362c8652b5d39535558c0dca0794bc26eb3d14ce77f1"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x833e}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xee, 0x5, "20058c853fd1c5c00918236938f7ead590cda56a632a1c5308edcb9383864566f06cd6a1ba403d0046780c1d5a17d5a37c8c741c99106c037176370d3efd06c8fa1b26babc4c89ce614e195407da29f5727d06a7611b282fa27e17ead8e3683a1f630b29e555efc7888d03fa05cf064ef318803d7e03f16b8c81074df05c326ec2a89935f08cd4f039b9d26ca6eadbd38322c3eeb9dd21eb7ef8c06a6e110f5f9236e776fe060f8d2654307d6413c513634d3e5baeca96cdfd79016f5f1a84f3f95f1a621a67d2c1a0e5b9cea32fb84034f9de3adaa8305a3ea37b4a07014e642eadc4c54bca374d9a71"}, @ETHTOOL_A_BITSET_MASK={0x79, 0x5, "c6d8c0be76a296751476b103a2fdacf52376043928a25a93f686d7e483437107e2241024a5bda520dac914d555a88eec1f81bf315327d441e5e28700455237b271a3a2b2b9d20cc9a1fc035c7b58e6b2b7d5290734d4b5e7a2705d5702877fb1bd7d05538a6c13581ef6b814969a423e96837f9996"}]}, @ETHTOOL_A_WOL_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}, @ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_SOPASS={0xd2, 0x3, "09d7478a2a282d5d1d99f29bef9d124fc547a9d5e01cb0b8295ff072e23a5b743c0c03d10d2fa3f95049176437803768054def8215f64a6b4e672fc49b985286c68930f0d9fe658e9cda59a83fbfb9ad45f5a0debad479a926f672355213cd7552fb8f093dc905ea9e0368d2c3dceafe8ddb7f418c6594a1fb2dbfa5e71089db72bc847296b4a7b7ff31a2d52350df18d81a07b7e499c938494347159f13ed8d480ca0bd14a6e918ea5bb3e558842c7d093e0d409cc897caf9a0b25a18464791bb39e777233672da6f7780b7d3e3"}]}, 0x1590}}, 0x4) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r5, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 13:24:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r4, r0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r5, 0x1}}, 0x10) 13:24:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000100)=@raw=[@map_idx_val={0x18, 0xc, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000140)='syzkaller\x00', 0xff, 0x72, &(0x7f0000000180)=""/114, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x8, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r2, 0x0, 0x25, 0x9}, 0x10) 13:24:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x7, 0x9, 0x4, @dev={0xfe, 0x80, '\x00', 0xa}, @remote, 0xc83fc0ab5ef5e245, 0x7, 0x6}}) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000001980)={0x1590, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_WOL_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}, @ETHTOOL_A_WOL_MODES={0x1420, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xa7, 0x4, "6cd0134555750d0792b47cacad9ede3f2dfc7ff3ac25eb75f33541c096aa3840cf3c2dc7ccced03b511f368480a3a5ab735391fdfe7f3c2dcb00c76ba307c069ed4f0dc3eb5da50890abc1f27da14754ab0c8d89b92e39124129c5f5930e8bef9f09bd9180c578cd9b374d973e2b3f478b02298032e88314d7a20bafedae7004b08e52b507c3ba008b93a970b93e4a42b0c1b2710b864fcbce99bcbd31847507217271"}, @ETHTOOL_A_BITSET_MASK={0x4b, 0x5, "d5da2251afcb6242c4d6663c36d300974bd07ebb6caf00c2b3583f17614d53d09191b458da2037c571d1ed23267705614a5fc7f6a34dced366a399e4e057a724f859e9fa689930"}, @ETHTOOL_A_BITSET_VALUE={0x10, 0x4, "6c31f1e978a66c7f78342f0f"}, @ETHTOOL_A_BITSET_MASK={0xfd, 0x5, "82954286b2b318a888cd70795ed1d0aee9c417661de9ac667d7d1a426185943c4bb26369a09acbca7b3b78bec5f5731e232c539c900e5dae823dfdd7b24d35ebbc29000e28cb88d2805d106f84e5a763ec3eb5f6a51c14f002098c5deb0fe36a5050baa60f17911fbb8be208eb773f1400a805ae102721e2c38e0f4acb66f12623d270c6b688576e95cc0add3f30f5f979d027b6ecde3db407df7ea98739828690151c1b5ad4e710f4351ddb87f4dee973455236b70ea493e37d6935321861322957d408b0e3eea51cfac4f9b90caa619fe02becf957323fb016190d17516e2948195b8949a478341453a2961d921711c2fc22d7acfc3baa56"}, @ETHTOOL_A_BITSET_VALUE={0x9c, 0x4, "a2a0f691dc51f60f07838e0e95aa45374eb566119b41d751fd8769613a24c95c1115c8f667db0d1ca3715b256a25b41b2a98fc870e6f883adc34e094e08b291733edff44b32003045110d5461849d8100de5c90611ed0d6ff5a293a265e592ed3a1868ea6295835b42ec81fd3983d784d79f921150514757615be853aed6bbb39034362c8652b5d39535558c0dca0794bc26eb3d14ce77f1"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x833e}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xee, 0x5, "20058c853fd1c5c00918236938f7ead590cda56a632a1c5308edcb9383864566f06cd6a1ba403d0046780c1d5a17d5a37c8c741c99106c037176370d3efd06c8fa1b26babc4c89ce614e195407da29f5727d06a7611b282fa27e17ead8e3683a1f630b29e555efc7888d03fa05cf064ef318803d7e03f16b8c81074df05c326ec2a89935f08cd4f039b9d26ca6eadbd38322c3eeb9dd21eb7ef8c06a6e110f5f9236e776fe060f8d2654307d6413c513634d3e5baeca96cdfd79016f5f1a84f3f95f1a621a67d2c1a0e5b9cea32fb84034f9de3adaa8305a3ea37b4a07014e642eadc4c54bca374d9a71"}, @ETHTOOL_A_BITSET_MASK={0x79, 0x5, "c6d8c0be76a296751476b103a2fdacf52376043928a25a93f686d7e483437107e2241024a5bda520dac914d555a88eec1f81bf315327d441e5e28700455237b271a3a2b2b9d20cc9a1fc035c7b58e6b2b7d5290734d4b5e7a2705d5702877fb1bd7d05538a6c13581ef6b814969a423e96837f9996"}]}, @ETHTOOL_A_WOL_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}, @ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_SOPASS={0xd2, 0x3, "09d7478a2a282d5d1d99f29bef9d124fc547a9d5e01cb0b8295ff072e23a5b743c0c03d10d2fa3f95049176437803768054def8215f64a6b4e672fc49b985286c68930f0d9fe658e9cda59a83fbfb9ad45f5a0debad479a926f672355213cd7552fb8f093dc905ea9e0368d2c3dceafe8ddb7f418c6594a1fb2dbfa5e71089db72bc847296b4a7b7ff31a2d52350df18d81a07b7e499c938494347159f13ed8d480ca0bd14a6e918ea5bb3e558842c7d093e0d409cc897caf9a0b25a18464791bb39e777233672da6f7780b7d3e3"}]}, 0x1590}}, 0x4) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r5, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 13:24:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000100)=@raw=[@map_idx_val={0x18, 0xc, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000140)='syzkaller\x00', 0xff, 0x72, &(0x7f0000000180)=""/114, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x8, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r2, 0x0, 0x25, 0x9}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x2, &(0x7f0000000100)=@raw=[@map_idx_val={0x18, 0xc, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000140)='syzkaller\x00', 0xff, 0x72, &(0x7f0000000180)=""/114, 0x41100, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x8, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x80) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r2, 0x0, 0x25, 0x9}, 0x10) (async) 13:24:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x8000000, @private0, 0x3}, r1}}, 0x1) 13:24:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000001c0)={'syztnl1\x00', &(0x7f0000000140)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x7, 0x9, 0x4, @dev={0xfe, 0x80, '\x00', 0xa}, @remote, 0xc83fc0ab5ef5e245, 0x7, 0x6}}) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000001980)={0x1590, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@ETHTOOL_A_WOL_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}, @ETHTOOL_A_WOL_MODES={0x1420, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xa7, 0x4, "6cd0134555750d0792b47cacad9ede3f2dfc7ff3ac25eb75f33541c096aa3840cf3c2dc7ccced03b511f368480a3a5ab735391fdfe7f3c2dcb00c76ba307c069ed4f0dc3eb5da50890abc1f27da14754ab0c8d89b92e39124129c5f5930e8bef9f09bd9180c578cd9b374d973e2b3f478b02298032e88314d7a20bafedae7004b08e52b507c3ba008b93a970b93e4a42b0c1b2710b864fcbce99bcbd31847507217271"}, @ETHTOOL_A_BITSET_MASK={0x4b, 0x5, "d5da2251afcb6242c4d6663c36d300974bd07ebb6caf00c2b3583f17614d53d09191b458da2037c571d1ed23267705614a5fc7f6a34dced366a399e4e057a724f859e9fa689930"}, @ETHTOOL_A_BITSET_VALUE={0x10, 0x4, "6c31f1e978a66c7f78342f0f"}, @ETHTOOL_A_BITSET_MASK={0xfd, 0x5, "82954286b2b318a888cd70795ed1d0aee9c417661de9ac667d7d1a426185943c4bb26369a09acbca7b3b78bec5f5731e232c539c900e5dae823dfdd7b24d35ebbc29000e28cb88d2805d106f84e5a763ec3eb5f6a51c14f002098c5deb0fe36a5050baa60f17911fbb8be208eb773f1400a805ae102721e2c38e0f4acb66f12623d270c6b688576e95cc0add3f30f5f979d027b6ecde3db407df7ea98739828690151c1b5ad4e710f4351ddb87f4dee973455236b70ea493e37d6935321861322957d408b0e3eea51cfac4f9b90caa619fe02becf957323fb016190d17516e2948195b8949a478341453a2961d921711c2fc22d7acfc3baa56"}, @ETHTOOL_A_BITSET_VALUE={0x9c, 0x4, "a2a0f691dc51f60f07838e0e95aa45374eb566119b41d751fd8769613a24c95c1115c8f667db0d1ca3715b256a25b41b2a98fc870e6f883adc34e094e08b291733edff44b32003045110d5461849d8100de5c90611ed0d6ff5a293a265e592ed3a1868ea6295835b42ec81fd3983d784d79f921150514757615be853aed6bbb39034362c8652b5d39535558c0dca0794bc26eb3d14ce77f1"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x833e}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xee, 0x5, "20058c853fd1c5c00918236938f7ead590cda56a632a1c5308edcb9383864566f06cd6a1ba403d0046780c1d5a17d5a37c8c741c99106c037176370d3efd06c8fa1b26babc4c89ce614e195407da29f5727d06a7611b282fa27e17ead8e3683a1f630b29e555efc7888d03fa05cf064ef318803d7e03f16b8c81074df05c326ec2a89935f08cd4f039b9d26ca6eadbd38322c3eeb9dd21eb7ef8c06a6e110f5f9236e776fe060f8d2654307d6413c513634d3e5baeca96cdfd79016f5f1a84f3f95f1a621a67d2c1a0e5b9cea32fb84034f9de3adaa8305a3ea37b4a07014e642eadc4c54bca374d9a71"}, @ETHTOOL_A_BITSET_MASK={0x79, 0x5, "c6d8c0be76a296751476b103a2fdacf52376043928a25a93f686d7e483437107e2241024a5bda520dac914d555a88eec1f81bf315327d441e5e28700455237b271a3a2b2b9d20cc9a1fc035c7b58e6b2b7d5290734d4b5e7a2705d5702877fb1bd7d05538a6c13581ef6b814969a423e96837f9996"}]}, @ETHTOOL_A_WOL_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}, @ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_SOPASS={0xd2, 0x3, "09d7478a2a282d5d1d99f29bef9d124fc547a9d5e01cb0b8295ff072e23a5b743c0c03d10d2fa3f95049176437803768054def8215f64a6b4e672fc49b985286c68930f0d9fe658e9cda59a83fbfb9ad45f5a0debad479a926f672355213cd7552fb8f093dc905ea9e0368d2c3dceafe8ddb7f418c6594a1fb2dbfa5e71089db72bc847296b4a7b7ff31a2d52350df18d81a07b7e499c938494347159f13ed8d480ca0bd14a6e918ea5bb3e558842c7d093e0d409cc897caf9a0b25a18464791bb39e777233672da6f7780b7d3e3"}]}, 0x1590}}, 0x4) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r5, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 13:24:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0x1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x106, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0x1}}, 0x10) (async) 13:24:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000001c0)={r3, 0x2, 0x5, "ab1b79cec6"}) (async) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) r5 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) ioctl$sock_SIOCDELRT(r4, 0x890c, &(0x7f0000000140)={0x0, @l2tp={0x2, 0x0, @rand_addr=0x64010102, 0x1}, @generic={0x2c, "611138c6f95482d957cf297fafe5"}, @can={0x1d, r6}, 0x401, 0x0, 0x0, 0x0, 0x400, 0x0, 0x101, 0x4, 0x1}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x9}}, @fwd={0xc}, @typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x3}]}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xc, 0x3}, {0xe}, {0x6, 0x2}, {0xc, 0x2}]}, @func={0x10, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x2e, 0x0, 0x5f, 0x0, 0x61, 0x5f, 0x2e, 0x0]}}, &(0x7f00000002c0)=""/20, 0xaa, 0x14, 0x1}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e25, 0x800000, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:58 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r4, r0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r5, 0x1}}, 0x10) 13:24:58 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r1, r3}}, 0x18) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x400}, 0x8) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x8000000, @private0, 0x3}, r1}}, 0x1) 13:24:58 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x7fffffff, 0x742, "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", 0xb7, 0x6, 0x1f, 0x9, 0x6, 0x1f, 0x7, 0x1}, r3}}, 0x120) 13:24:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x600800, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r2, 0x7a8, &(0x7f00000000c0)={{@host, 0x88b4}, @hyper, 0x4, 0x9, 0x4, 0x3, 0xfffffffffffff4c5, 0xfffffffc}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:24:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r1, r3}}, 0x18) (async) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x8000000, @private0, 0x3}, r1}}, 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x8000000, @private0, 0x3}, r1}}, 0x1) (async) 13:24:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x0, {0xa, 0x4e22, 0x3, @loopback, 0x1}, r2}}, 0x38) 13:24:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x400}, 0x8) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x400}, 0x8) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x7fffffff, 0x742, "5325445318dae67b6951ec2ba4cc21d3cb529ab65f8a7b18a185b9725e15f06b0c2d92af23369f062cbf0e3b630a1cf5d0080fcba8cc6b212f271a5ad3b7e6635f9ca6ffc38d662e9878798b1aebe07bb13df73d97e0d39420d00b8edfc10c9f68cf00ec609c0a785fea311a7bf2ef4554efb3d2fdaaf85673e48a8b4bd2d708658f14c21a19997596c43698e77c4ac0f71993a87224ec7870deb669d7500eef214354addd3525ea32f3f53e28ce8b2bb563a057896f4348cf2cbcf8945d36946c46ac7713971adb4bca691ac09d2719a254c4c66ea803ca7006e58517b4989a6d8f55cb6d410998f54990a3b9bcbe9b41b27bbcf4d7a07a84aff70b0bb22090", 0xb7, 0x6, 0x1f, 0x9, 0x6, 0x1f, 0x7, 0x1}, r3}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x2, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x7fffffff, 0x742, "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", 0xb7, 0x6, 0x1f, 0x9, 0x6, 0x1f, 0x7, 0x1}, r3}}, 0x120) (async) 13:24:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x600800, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r2, 0x7a8, &(0x7f00000000c0)={{@host, 0x88b4}, @hyper, 0x4, 0x9, 0x4, 0x3, 0xfffffffffffff4c5, 0xfffffffc}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:24:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x0, {0xa, 0x4e22, 0x3, @loopback, 0x1}, r2}}, 0x38) 13:24:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r1, r3}}, 0x18) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) syz_init_net_socket$ax25(0x3, 0x2, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r1, r3}}, 0x18) (async) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:24:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000600)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x1c, 0x0, @in6={0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}}}, 0x90) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000feb000/0x13000)=nil, 0x13000}, 0x4}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) r9 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400), 0xffffffffffffffff) socketpair(0x10, 0x1, 0x5, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x5c, r9, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x13, 0xa, '/dev/dlm_plock\x00'}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r10}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40044}, 0x15) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r8}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x2d000000, "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", 0x40, 0x0, 0x1f, 0xfd, 0x3, 0x81, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x200, @remote, 0x3}, r1}}, 0x30) 13:24:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x600800, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r2, 0x7a8, &(0x7f00000000c0)={{@host, 0x88b4}, @hyper, 0x4, 0x9, 0x4, 0x3, 0xfffffffffffff4c5, 0xfffffffc}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:24:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x0, {0xa, 0x4e22, 0x3, @loopback, 0x1}, r2}}, 0x38) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x7fffffff, 0x742, "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", 0xb7, 0x6, 0x1f, 0x9, 0x6, 0x1f, 0x7, 0x1}, r3}}, 0x120) 13:24:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e23, 0x12, @loopback, 0x1}, r1}}, 0xfffffffffffffeee) 13:24:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async, rerun: 32) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x400}, 0x8) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (rerun: 64) 13:24:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}}}, 0x30) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, '\x00', 0x14}, 0x5}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x4db}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}}}, 0x30) 13:24:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000600)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x1c, 0x0, @in6={0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}}}, 0x90) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) (async) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000feb000/0x13000)=nil, 0x13000}, 0x4}) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r9 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400), 0xffffffffffffffff) (async) socketpair(0x10, 0x1, 0x5, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x5c, r9, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x13, 0xa, '/dev/dlm_plock\x00'}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r10}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40044}, 0x15) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r8}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x2d000000, "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", 0x40, 0x0, 0x1f, 0xfd, 0x3, 0x81, 0x1}}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x200, @remote, 0x3}, r1}}, 0x30) 13:24:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e23, 0x12, @loopback, 0x1}, r1}}, 0xfffffffffffffeee) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, '\x00', 0x14}, 0x5}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}}}, 0x30) 13:24:59 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, '\x00', 0x14}, 0x5}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, '\x00', 0x14}, 0x5}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:24:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x4db}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) 13:24:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x0, {0xa, 0x4e23, 0x12, @loopback, 0x1}, r1}}, 0xfffffffffffffeee) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3}}, 0x10) 13:24:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r4, 0x4db}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000600)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x1c, 0x0, @in6={0xa, 0x4e24, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}}}, 0x90) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) (async) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000feb000/0x13000)=nil, 0x13000}, 0x4}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) r9 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400), 0xffffffffffffffff) (async) socketpair(0x10, 0x1, 0x5, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240), 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x5c, r9, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0x13, 0xa, '/dev/dlm_plock\x00'}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1f}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r10}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40044}, 0x15) write$RDMA_USER_CM_CMD_NOTIFY(r7, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r8}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x0, 0x2d000000, "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", 0x40, 0x0, 0x1f, 0xfd, 0x3, 0x81, 0x1}}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x200, @remote, 0x3}, r1}}, 0x30) 13:24:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'sit0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x1, 0x700, 0x7, 0xfffffe00, {{0x7, 0x4, 0x3, 0x9, 0x1c, 0x68, 0x0, 0x5, 0x4, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}]}}}}}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r8, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r9 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r9, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r10, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000680)={&(0x7f0000000340)={0x32c, 0x0, 0x502, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7c}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r6}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x90, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x42d2da35}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0xffff, 0x2, 0x0, 0x549db25}, {0x9a7, 0x8, 0x5, 0x7}, {0xf2b, 0x0, 0x5d, 0x7fffffff}, {0xaa, 0x1, 0xff, 0x7}]}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x4004001}, 0x0) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r11, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0x9}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000100)) 13:24:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x400000, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r3}}, 0x30) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x0, 0x5, "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", 0x6, 0xb8, 0x7, 0x8, 0x7, 0x1f, 0x0, 0x1}, r3}}, 0x120) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x3f, 0x8, 0x9, 0x28, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x5, 0xfffffffa}}) sendto$packet(r1, &(0x7f0000000500)="4274c3e19e4bc8ef06eecca6b8612c1674f88dfef9b8191ea5865d84ef8e3a83d735e294eef93ca53bcebc877e1b5397c94897fd59ef4045a3e775675eda6898622a5500207def44ecfcc5def226080254d4bec91cd23d37f4b5e1d18b1f0285681b8c6501b39e7aeb7c863f672acf6c606fd969a6d1659897d5c1f6141428ea2132b127aecba7c2e34945e382650d48fded3021205cddc77199208656732e1dffa88d6153", 0xa5, 0x4090, &(0x7f00000005c0)={0x11, 0x10, r7, 0x1, 0x6, 0x6, @random="37197759945a"}, 0x14) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e23, 0x7fffffff, @mcast2, 0x65}, r3}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000004c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000100)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, '\x00', 0x30}, 0x1}}}, 0x30) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x4, @private2, 0x5}}}, 0x90) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3}}, 0x10) (async) 13:24:59 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) 13:24:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'sit0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x1, 0x700, 0x7, 0xfffffe00, {{0x7, 0x4, 0x3, 0x9, 0x1c, 0x68, 0x0, 0x5, 0x4, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) r5 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) r7 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r8, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r9 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r9, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r10, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000680)={&(0x7f0000000340)={0x32c, 0x0, 0x502, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7c}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r6}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x90, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x42d2da35}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0xffff, 0x2, 0x0, 0x549db25}, {0x9a7, 0x8, 0x5, 0x7}, {0xf2b, 0x0, 0x5d, 0x7fffffff}, {0xaa, 0x1, 0xff, 0x7}]}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x4004001}, 0x0) (async) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r11, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0x9}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000100)) 13:24:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000480)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000240)=0xf1, 0xffffffffffffffff, 0x0, 0x0, 0x3c}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) r3 = accept$ax25(r2, 0x0, &(0x7f0000000280)) connect$ax25(r3, &(0x7f00000002c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default, @bcast, @bcast]}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r4, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r1, 0x5, "828422", "f430f538770c31cc29f56c0b8c11d012ecfca15943864604afea6dd4a4241204956e1d535b0f0d3eb954f617baee6052961eae7ab9976d1b0b04963fde1c40c245f76f5e35b9e4d38ecca39ddd39c3038e6ecc54ffd34ea88fe8e05e48087713518060c98c9f2f60ae2b899959185bb0955cbb93ccb2ce3fa3ea7bcb7f10cb04d7d34ab8dcc02473417224c9e67ff51fe977eeb387d53d22c0c88a2f7af52ac8de3ad1ea7116598aa15e6acc7a17096044f0793ff2cd9f380c59a93bf6085d1a03bc5bf2fbfc9b0b680cb6abc8de94961c82c9b66595a40bb7ce338164495b6fb7d17371007812f640df01437708b504ce749f351619ed6f44b7f02ea3e3f998"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) syz_init_net_socket$ax25(0x3, 0x5, 0x1) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:24:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) 13:24:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000480)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000240)=0xf1, 0xffffffffffffffff, 0x0, 0x0, 0x3c}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) r3 = accept$ax25(r2, 0x0, &(0x7f0000000280)) connect$ax25(r3, &(0x7f00000002c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default, @bcast, @bcast]}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r4, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r1, 0x5, "828422", "f430f538770c31cc29f56c0b8c11d012ecfca15943864604afea6dd4a4241204956e1d535b0f0d3eb954f617baee6052961eae7ab9976d1b0b04963fde1c40c245f76f5e35b9e4d38ecca39ddd39c3038e6ecc54ffd34ea88fe8e05e48087713518060c98c9f2f60ae2b899959185bb0955cbb93ccb2ce3fa3ea7bcb7f10cb04d7d34ab8dcc02473417224c9e67ff51fe977eeb387d53d22c0c88a2f7af52ac8de3ad1ea7116598aa15e6acc7a17096044f0793ff2cd9f380c59a93bf6085d1a03bc5bf2fbfc9b0b680cb6abc8de94961c82c9b66595a40bb7ce338164495b6fb7d17371007812f640df01437708b504ce749f351619ed6f44b7f02ea3e3f998"}}, 0x110) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'sit0\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x1, 0x700, 0x7, 0xfffffe00, {{0x7, 0x4, 0x3, 0x9, 0x1c, 0x68, 0x0, 0x5, 0x4, 0x0, @remote, @multicast2, {[@ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) r5 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) r7 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r8, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) r9 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r9, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r10, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000680)={&(0x7f0000000340)={0x32c, 0x0, 0x502, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7c}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r6}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r10}, {0x90, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x42d2da35}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0xffff, 0x2, 0x0, 0x549db25}, {0x9a7, 0x8, 0x5, 0x7}, {0xf2b, 0x0, 0x5d, 0x7fffffff}, {0xaa, 0x1, 0xff, 0x7}]}}}]}}]}, 0x32c}, 0x1, 0x0, 0x0, 0x4004001}, 0x0) (async) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r11, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0x9}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000100)) 13:24:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async, rerun: 32) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x400000, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r3}}, 0x30) (async, rerun: 32) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (rerun: 32) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x0, 0x5, "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", 0x6, 0xb8, 0x7, 0x8, 0x7, 0x1f, 0x0, 0x1}, r3}}, 0x120) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) r6 = socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 32) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x3f, 0x8, 0x9, 0x28, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x5, 0xfffffffa}}) sendto$packet(r1, &(0x7f0000000500)="4274c3e19e4bc8ef06eecca6b8612c1674f88dfef9b8191ea5865d84ef8e3a83d735e294eef93ca53bcebc877e1b5397c94897fd59ef4045a3e775675eda6898622a5500207def44ecfcc5def226080254d4bec91cd23d37f4b5e1d18b1f0285681b8c6501b39e7aeb7c863f672acf6c606fd969a6d1659897d5c1f6141428ea2132b127aecba7c2e34945e382650d48fded3021205cddc77199208656732e1dffa88d6153", 0xa5, 0x4090, &(0x7f00000005c0)={0x11, 0x10, r7, 0x1, 0x6, 0x6, @random="37197759945a"}, 0x14) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e23, 0x7fffffff, @mcast2, 0x65}, r3}}, 0x38) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000004c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000100)={0xf, 0x8}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, '\x00', 0x30}, 0x1}}}, 0x30) (rerun: 32) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x4, @private2, 0x5}}}, 0x90) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3}}, 0x10) 13:24:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) syz_init_net_socket$ax25(0x3, 0x5, 0x1) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:24:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000480)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000240)=0xf1, 0xffffffffffffffff, 0x0, 0x0, 0x3c}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) r3 = accept$ax25(r2, 0x0, &(0x7f0000000280)) connect$ax25(r3, &(0x7f00000002c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @default, @bcast, @bcast]}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r4, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r1, 0x5, "828422", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x113703, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f00000002c0)=0xab) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r4, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f00000001c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x0, @mcast2, 0xdb82}, r5}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 13:24:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) (async) 13:24:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) syz_init_net_socket$ax25(0x3, 0x5, 0x1) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:24:59 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x400000, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r3}}, 0x30) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x0, 0x5, "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", 0x6, 0xb8, 0x7, 0x8, 0x7, 0x1f, 0x0, 0x1}, r3}}, 0x120) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x3f, 0x8, 0x9, 0x28, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x5, 0xfffffffa}}) sendto$packet(r1, &(0x7f0000000500)="4274c3e19e4bc8ef06eecca6b8612c1674f88dfef9b8191ea5865d84ef8e3a83d735e294eef93ca53bcebc877e1b5397c94897fd59ef4045a3e775675eda6898622a5500207def44ecfcc5def226080254d4bec91cd23d37f4b5e1d18b1f0285681b8c6501b39e7aeb7c863f672acf6c606fd969a6d1659897d5c1f6141428ea2132b127aecba7c2e34945e382650d48fded3021205cddc77199208656732e1dffa88d6153", 0xa5, 0x4090, &(0x7f00000005c0)={0x11, 0x10, r7, 0x1, 0x6, 0x6, @random="37197759945a"}, 0x14) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e23, 0x7fffffff, @mcast2, 0x65}, r3}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000004c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000100)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, '\x00', 0x30}, 0x1}}}, 0x30) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x4, @private2, 0x5}}}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x400000, 0x0) (async) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r3}}, 0x30) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x0, 0x5, "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", 0x6, 0xb8, 0x7, 0x8, 0x7, 0x1f, 0x0, 0x1}, r3}}, 0x120) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x3f, 0x8, 0x9, 0x28, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x5, 0xfffffffa}}) (async) sendto$packet(r1, &(0x7f0000000500)="4274c3e19e4bc8ef06eecca6b8612c1674f88dfef9b8191ea5865d84ef8e3a83d735e294eef93ca53bcebc877e1b5397c94897fd59ef4045a3e775675eda6898622a5500207def44ecfcc5def226080254d4bec91cd23d37f4b5e1d18b1f0285681b8c6501b39e7aeb7c863f672acf6c606fd969a6d1659897d5c1f6141428ea2132b127aecba7c2e34945e382650d48fded3021205cddc77199208656732e1dffa88d6153", 0xa5, 0x4090, &(0x7f00000005c0)={0x11, 0x10, r7, 0x1, 0x6, 0x6, @random="37197759945a"}, 0x14) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e23, 0x7fffffff, @mcast2, 0x65}, r3}}, 0x38) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000004c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000100)={0xf, 0x8}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, '\x00', 0x30}, 0x1}}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x4, @private2, 0x5}}}, 0x90) (async) 13:24:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 2: getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000040)=""/236, 0xec, 0x0, &(0x7f0000000180)=""/213, 0xd5}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x3}}}, 0x30) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000003c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) (rerun: 32) 13:24:59 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:24:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x113703, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f00000002c0)=0xab) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r4, 0x4}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) syz_genetlink_get_family_id$team(&(0x7f00000001c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x0, @mcast2, 0xdb82}, r5}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 13:24:59 executing program 2: getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000040)=""/236, 0xec, 0x0, &(0x7f0000000180)=""/213, 0xd5}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x3}}}, 0x30) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000003c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000040)=""/236, 0xec, 0x0, &(0x7f0000000180)=""/213, 0xd5}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x3}}}, 0x30) (async) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000003c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) (async) 13:24:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) (async) 13:24:59 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x113703, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(0xffffffffffffffff, 0x40045730, &(0x7f00000002c0)=0xab) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r4, 0x4}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) syz_genetlink_get_family_id$team(&(0x7f00000001c0), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x0, @mcast2, 0xdb82}, r5}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 13:25:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000340)={@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xd, 0xfffffffffffffffe, 0x6, [@default, @default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @bcast]}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0xfffffffc, 0x8, "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", 0x1, 0xee, 0x5, 0x81, 0xea, 0x81, 0x40, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x6, @remote}, r1}}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e21, 0xffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0xd9a8}, r1}}, 0x38) 13:25:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r1, 0x3f, "83e062", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x408001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x3, {0xa, 0x4e23, 0x80000001, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1000}, r4}}, 0x38) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000300)={0xf, 0x8, 0xfa00, {r4, 0x13}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 13:25:00 executing program 2: getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000040)=""/236, 0xec, 0x0, &(0x7f0000000180)=""/213, 0xd5}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x3}}}, 0x30) (async) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f00000003c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) 13:25:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0xe7b, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x0, {"36f8d0924802dcfb1397d491ec5c7478"}, 0x6, 0x7, 0xffe000}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r1, 0x181}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r1, 0x3f, "83e062", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x408001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x3, {0xa, 0x4e23, 0x80000001, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1000}, r4}}, 0x38) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000300)={0xf, 0x8, 0xfa00, {r4, 0x13}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r2}}, 0xc) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r1, 0x3f, "83e062", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100), 0x0, 0x9}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x408001, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240), 0x13f, 0xd}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x3, {0xa, 0x4e23, 0x80000001, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1000}, r4}}, 0x38) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000300)={0xf, 0x8, 0xfa00, {r4, 0x13}}, 0x10) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r2}}, 0xc) (async) 13:25:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000340)={@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xd, 0xfffffffffffffffe, 0x6, [@default, @default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @bcast]}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0xfffffffc, 0x8, "92ffe42b5d6d0fa7b02dd63eba81e028a4771482b8f520baec37528164f6990acb4442d38cd8f2736b1c26104dbaab9cff96655cdd5fde9a05406941ab2953b30f2df4dc52e65a367ca2e8ffa83ecb9bb5c5b3965d19f47fd39e249a52067de7246a1c5b9570f3ccda868786d312c70e2ba5ed74b1dfbbb92eca8bb3cb1efc4eb5606713c93f5dfe3b5699918388d67c0ca60aab4618bb098c4dfc1c85ad0ce5192433fcec2374861203d447206b5e20ea2cb2e4e7b71d912ddb8bc606c517f0e8cf16dcdf42f00fc72a01fefd70a529a16f10b59dd515d068dccfa6bd1ee303ba91f8a5f8d5172b41929dbdb7adfc92081ff21db644abd169dbb4ba39e453a9", 0x1, 0xee, 0x5, 0x81, 0xea, 0x81, 0x40, 0x1}}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x6, @remote}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e21, 0xffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0xd9a8}, r1}}, 0x38) 13:25:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000480)={0x7, 0x8, 0xfa00, {r3, 0xf6}}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x109980, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x6, 0x18000000, "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", 0xff, 0x0, 0x0, 0x1, 0x1, 0x81, 0x6, 0x1}}}, 0x120) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x2, {0x1, 0x3, "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", 0x1, 0x1, 0x2, 0x81, 0x81, 0x3, 0x7f}, r7}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r1, 0x181}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x111, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r1, 0x181}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) 13:25:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000340)={@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xd, 0xfffffffffffffffe, 0x6, [@default, @default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @bcast]}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0xfffffffc, 0x8, "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", 0x1, 0xee, 0x5, 0x81, 0xea, 0x81, 0x40, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x6, @remote}, r1}}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e21, 0xffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0xd9a8}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000340)={@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0xd, 0xfffffffffffffffe, 0x6, [@default, @default, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @bcast]}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0xfffffffc, 0x8, "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", 0x1, 0xee, 0x5, 0x81, 0xea, 0x81, 0x40, 0x1}}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x6, @remote}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x0, {0xa, 0x4e21, 0xffff, @dev={0xfe, 0x80, '\x00', 0x31}, 0xd9a8}, r1}}, 0x38) (async) 13:25:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0xe7b, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x0, {"36f8d0924802dcfb1397d491ec5c7478"}, 0x6, 0x7, 0xffe000}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x118) (async, rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r1, 0x3f, "83e062", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) (async, rerun: 32) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x408001, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x3, {0xa, 0x4e23, 0x80000001, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1000}, r4}}, 0x38) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000300)={0xf, 0x8, 0xfa00, {r4, 0x13}}, 0x10) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 13:25:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r1, 0x181}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0xe7b, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x0, {"36f8d0924802dcfb1397d491ec5c7478"}, 0x6, 0x7, 0xffe000}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@getrule={0x14, 0x22, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000e1}, 0x44000) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000480)={0x7, 0x8, 0xfa00, {r3, 0xf6}}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x109980, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x6, 0x18000000, "10c203c7ae7bc0dbb6ba2a7440a403ac54c969eb73aac4292359c49fab083f128ac98a1511e9db1002ed0fdf69d7f4301b5cf63f29d4c0df04d298d34b3aa85b8edf972978a39c8104c7601cf0cb8a1f59a3b738dc61273288ea90b6363e35c080995a78eb32f70698f37dca7b275cc7f2cf3751c110f713ae77f421ab7b2d8c069a306f3374658829ea7014ad0a4c557f8ab1929d4f088b214174accd3937928e472e544c9510ab57f3aecbae64e2aa20b38468fed8695845d81b503e0f2e8b10efa2318130aefb8b4380b40cf1d937df2f7dfadace76ffb1e2468585b70dff74fef07e6a4fec4e3708c46e5c1d95da527f9c5f9c2970bec2d510927f5584d4", 0xff, 0x0, 0x0, 0x1, 0x1, 0x81, 0x6, 0x1}}}, 0x120) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x2, {0x1, 0x3, "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", 0x1, 0x1, 0x2, 0x81, 0x81, 0x3, 0x7f}, r7}}, 0x128) (async, rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r3, 0x3}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@getrule={0x14, 0x22, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000e1}, 0x44000) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@getrule={0x14, 0x22, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000e1}, 0x44000) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@getrule={0x14, 0x22, 0x800, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000e1}, 0x44000) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) (async) 13:25:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r3, 0x3}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 13:25:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r0}}, 0x18) 13:25:00 executing program 4: ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000200)=0x5) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x2710, @hyper}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0xffffffffffffff44}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000380)={0x7, 0x8, 0xfa00, {r1}}, 0x2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r3, 0x800442d2, &(0x7f00000002c0)={0x4, &(0x7f0000000240)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}, {}]}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 13:25:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x924}, 0x480c5) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) 13:25:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000480)={0x7, 0x8, 0xfa00, {r3, 0xf6}}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x109980, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x6, 0x18000000, "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", 0xff, 0x0, 0x0, 0x1, 0x1, 0x81, 0x6, 0x1}}}, 0x120) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x2, {0x1, 0x3, "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", 0x1, 0x1, 0x2, 0x81, 0x81, 0x3, 0x7f}, r7}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r3, 0x3}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x2}}, 0x10) (async) 13:25:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x924}, 0x480c5) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async, rerun: 64) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) 13:25:00 executing program 4: ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000200)=0x5) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x2710, @hyper}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0xffffffffffffff44}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000380)={0x7, 0x8, 0xfa00, {r1}}, 0x2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r3, 0x800442d2, &(0x7f00000002c0)={0x4, &(0x7f0000000240)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}, {}]}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 13:25:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x4002, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r2, 0xc0487c04, &(0x7f0000000180)={0x0, 0x2aaaaaaaaaaac4a, 0x0, &(0x7f0000000380), 0x9, 0x0, &(0x7f0000000b80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f0000000700), 0x666666666666741, 0x0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}]}) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f00000008c0)={{0x80000000, 0x0, 0x2, [0x401, 0x4]}, {0x80000000, 0x0, 0x0, [0x6, 0xaed]}, 0x10000000, [0x20, 0x3d8f1382]}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 13:25:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r0}}, 0x18) 13:25:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 13:25:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0xfffff800, 0x2, "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", 0x10, 0x9, 0x79, 0x81, 0x6, 0xfc, 0x9}, r3}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r0}}, 0x18) 13:25:00 executing program 4: ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000200)=0x5) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x2710, @hyper}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0xffffffffffffff44}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000380)={0x7, 0x8, 0xfa00, {r1}}, 0x2) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r3, 0x800442d2, &(0x7f00000002c0)={0x4, &(0x7f0000000240)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}, {}]}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 13:25:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0xfffff800, 0x2, "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", 0x10, 0x9, 0x79, 0x81, 0x6, 0xfc, 0x9}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0xfffff801, @private0, 0x6}, r1}}, 0x30) 13:25:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x4002, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r2, 0xc0487c04, &(0x7f0000000180)={0x0, 0x2aaaaaaaaaaac4a, 0x0, &(0x7f0000000380), 0x9, 0x0, &(0x7f0000000b80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f0000000700), 0x666666666666741, 0x0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}]}) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f00000008c0)={{0x80000000, 0x0, 0x2, [0x401, 0x4]}, {0x80000000, 0x0, 0x0, [0x6, 0xaed]}, 0x10000000, [0x20, 0x3d8f1382]}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x4002, 0x0) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(r2, 0xc0487c04, &(0x7f0000000180)={0x0, 0x2aaaaaaaaaaac4a, 0x0, &(0x7f0000000380), 0x9, 0x0, &(0x7f0000000b80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f0000000700), 0x666666666666741, 0x0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}]}) (async) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f00000008c0)={{0x80000000, 0x0, 0x2, [0x401, 0x4]}, {0x80000000, 0x0, 0x0, [0x6, 0xaed]}, 0x10000000, [0x20, 0x3d8f1382]}) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) 13:25:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0xfffff800, 0x2, "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", 0x10, 0x9, 0x79, 0x81, 0x6, 0xfc, 0x9}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x924}, 0x480c5) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x924}, 0x480c5) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) (async) 13:25:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0xfffff801, @private0, 0x6}, r1}}, 0x30) 13:25:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x111800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @private1, 0x1}, r3}}, 0x30) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x3f, 0x5, "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", 0x3f, 0x51, 0x3, 0xff, 0xff, 0x3, 0x1}, r5}}, 0x120) 13:25:00 executing program 5: write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffff8, @loopback, 0x8}}}, 0x30) 13:25:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x4002, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r2, 0xc0487c04, &(0x7f0000000180)={0x0, 0x2aaaaaaaaaaac4a, 0x0, &(0x7f0000000380), 0x9, 0x0, &(0x7f0000000b80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x3, 0x0, &(0x7f0000000700), 0x666666666666741, 0x0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}]}) (async, rerun: 64) ioctl$MEDIA_IOC_SETUP_LINK(0xffffffffffffffff, 0xc0347c03, &(0x7f00000008c0)={{0x80000000, 0x0, 0x2, [0x401, 0x4]}, {0x80000000, 0x0, 0x0, [0x6, 0xaed]}, 0x10000000, [0x20, 0x3d8f1382]}) (rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 13:25:00 executing program 5: write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffff8, @loopback, 0x8}}}, 0x30) 13:25:00 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:00 executing program 5: write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffff8, @loopback, 0x8}}}, 0x30) 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x4, {0xa, 0x4e22, 0xdee, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10001}, r2}}, 0x38) socketpair(0x1d, 0x0, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000003c0)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000440)={0x9, 0x108, 0xfa00, {r3, 0x0, "dadaf6", "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"}}, 0x110) connect$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @bcast, @default, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000200)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000380)={0x800}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x800, 0x1, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x1000000, &(0x7f0000000780)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@mmap}], [{@obj_type={'obj_type', 0x3d, '$\\'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000240)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r1, 0x7a4, &(0x7f0000000040)={{@host, 0x1}, 0x4, 0x3, 0xfffffd10, 0x8}) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r4}}, 0x30) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f0000000180)) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0xfffff801, @private0, 0x6}, r1}}, 0x30) 13:25:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x111800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @private1, 0x1}, r3}}, 0x30) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x3f, 0x5, "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", 0x3f, 0x51, 0x3, 0xff, 0xff, 0x3, 0x1}, r5}}, 0x120) 13:25:01 executing program 0: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0xe61d11f603590d7, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x25}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x8010) r0 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), 0xffffffffffffffff) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) socketpair(0x25, 0x1, 0x4, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x60, r0, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, ':'}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0xc000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x2, {0xa, 0x4e20, 0x6, @private1, 0x4}, r4}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r6}}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000680)={&(0x7f0000000740)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002abd7000ffdbdf25010000000c00020000080000000000000c000500080000000000000006000a00e57b00003400078008000100", @ANYRES32, @ANYBLOB="08101aec21565401000100d7010000000100000072b9a9801cc46606c80add8cd6a14a1e37104575aeceedc85fac43528407d2d63392c2aee87dd1d1c7126cb2d8cee118a7535435077867b00e91935ad3484de0d7a5a4f9fa10b37c50fab0bccef1b1891daa973ad9db7a5e91339e30df2a430e8675293f4828c3aa1c8b2c5ef84b73eb37c390eff49f1aeb0b2bea20f5f1444404d7ec3b54cd22253aa0000688534acffbd55337626e2d5df1b50de801cd13eb08660266658bdd9debd6", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="0800010000000000"], 0x70}}, 0x8) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/mnt\x00') 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x4, {0xa, 0x4e22, 0xdee, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10001}, r2}}, 0x38) socketpair(0x1d, 0x0, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000003c0)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000440)={0x9, 0x108, 0xfa00, {r3, 0x0, "dadaf6", "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"}}, 0x110) connect$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @bcast, @default, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000200)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000380)={0x800}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x800, 0x1, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x1000000, &(0x7f0000000780)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@mmap}], [{@obj_type={'obj_type', 0x3d, '$\\'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000240)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0), 0x13f, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x4, {0xa, 0x4e22, 0xdee, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10001}, r2}}, 0x38) (async) socketpair(0x1d, 0x0, 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000003c0), 0x111, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000440)={0x9, 0x108, 0xfa00, {r3, 0x0, "dadaf6", "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"}}, 0x110) (async) connect$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @bcast, @default, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) (async) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000200)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) (async) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000380)={0x800}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x800, 0x1, &(0x7f0000000680)) (async) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x1000000, &(0x7f0000000780)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@mmap}], [{@obj_type={'obj_type', 0x3d, '$\\'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000240)) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) 13:25:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r1, 0x7a4, &(0x7f0000000040)={{@host, 0x1}, 0x4, 0x3, 0xfffffd10, 0x8}) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x1}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r4}}, 0x30) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f0000000180)) 13:25:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x8, 0x80, 0x401, 0x80000000, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x66, 0x0, 0x1b, 0x2f, 0x0, @multicast1, @multicast1, {[@timestamp_prespec={0x44, 0xc, 0x75, 0x3, 0x1, [{@multicast2, 0x7fff}]}, @timestamp={0x44, 0x14, 0x99, 0x0, 0x8, [0x401, 0x1, 0x5, 0x3]}, @cipso={0x86, 0x3b, 0x3, [{0x1, 0x8, "e08fc8a4b3d1"}, {0x2, 0x7, "bc9642c716"}, {0x6, 0x5, "cbd36b"}, {0x0, 0x10, "4c0195a92d57c9ff78c5c4372ff3"}, {0x6, 0x9, "f4e8c0bd5fc3ba"}, {0x0, 0x8, "302181288598"}]}, @ra={0x94, 0x4}, @noop, @timestamp={0x44, 0x20, 0x6f, 0x0, 0x0, [0x1, 0x6, 0x3, 0x7, 0x7, 0x6, 0x7]}, @rr={0x7, 0x7, 0x92, [@multicast1]}, @lsrr={0x83, 0xb, 0x27, [@remote, @multicast1]}, @noop, @lsrr={0x83, 0x17, 0xf1, [@private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast1, @private=0xa010100]}]}}}}}) 13:25:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x111800, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @private1, 0x1}, r3}}, 0x30) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x3f, 0x5, "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", 0x3f, 0x51, 0x3, 0xff, 0xff, 0x3, 0x1}, r5}}, 0x120) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) 13:25:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r1, 0x7a4, &(0x7f0000000040)={{@host, 0x1}, 0x4, 0x3, 0xfffffd10, 0x8}) (async, rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r4}}, 0x30) (async, rerun: 32) ioctl$MEDIA_IOC_ENUM_ENTITIES(r1, 0xc1007c01, &(0x7f0000000180)) (rerun: 32) 13:25:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x8, 0x80, 0x401, 0x80000000, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x66, 0x0, 0x1b, 0x2f, 0x0, @multicast1, @multicast1, {[@timestamp_prespec={0x44, 0xc, 0x75, 0x3, 0x1, [{@multicast2, 0x7fff}]}, @timestamp={0x44, 0x14, 0x99, 0x0, 0x8, [0x401, 0x1, 0x5, 0x3]}, @cipso={0x86, 0x3b, 0x3, [{0x1, 0x8, "e08fc8a4b3d1"}, {0x2, 0x7, "bc9642c716"}, {0x6, 0x5, "cbd36b"}, {0x0, 0x10, "4c0195a92d57c9ff78c5c4372ff3"}, {0x6, 0x9, "f4e8c0bd5fc3ba"}, {0x0, 0x8, "302181288598"}]}, @ra={0x94, 0x4}, @noop, @timestamp={0x44, 0x20, 0x6f, 0x0, 0x0, [0x1, 0x6, 0x3, 0x7, 0x7, 0x6, 0x7]}, @rr={0x7, 0x7, 0x92, [@multicast1]}, @lsrr={0x83, 0xb, 0x27, [@remote, @multicast1]}, @noop, @lsrr={0x83, 0x17, 0xf1, [@private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast1, @private=0xa010100]}]}}}}}) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2, 0x1000}}, 0x10) (async) 13:25:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'syztnl2\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x8, 0x80, 0x401, 0x80000000, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x66, 0x0, 0x1b, 0x2f, 0x0, @multicast1, @multicast1, {[@timestamp_prespec={0x44, 0xc, 0x75, 0x3, 0x1, [{@multicast2, 0x7fff}]}, @timestamp={0x44, 0x14, 0x99, 0x0, 0x8, [0x401, 0x1, 0x5, 0x3]}, @cipso={0x86, 0x3b, 0x3, [{0x1, 0x8, "e08fc8a4b3d1"}, {0x2, 0x7, "bc9642c716"}, {0x6, 0x5, "cbd36b"}, {0x0, 0x10, "4c0195a92d57c9ff78c5c4372ff3"}, {0x6, 0x9, "f4e8c0bd5fc3ba"}, {0x0, 0x8, "302181288598"}]}, @ra={0x94, 0x4}, @noop, @timestamp={0x44, 0x20, 0x6f, 0x0, 0x0, [0x1, 0x6, 0x3, 0x7, 0x7, 0x6, 0x7]}, @rr={0x7, 0x7, 0x92, [@multicast1]}, @lsrr={0x83, 0xb, 0x27, [@remote, @multicast1]}, @noop, @lsrr={0x83, 0x17, 0xf1, [@private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast1, @private=0xa010100]}]}}}}}) 13:25:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200), 0x210c40, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000480)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000340)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x1}, @in={0x2, 0x4e22, @local}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000540)={0x7, 0x8, 0xfa00, {r7, 0x7fffffff}}, 0x10) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f00000004c0)={'vcan0\x00'}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r5}}, 0x30) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0xb0, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x72a0}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x5}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x18b}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4f2}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000000) 13:25:01 executing program 0: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0xe61d11f603590d7, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x25}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x8010) (async) r0 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), 0xffffffffffffffff) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) socketpair(0x25, 0x1, 0x4, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x60, r0, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, ':'}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0xc000) (async, rerun: 64) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x2, {0xa, 0x4e20, 0x6, @private1, 0x4}, r4}}, 0x38) (rerun: 32) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r6}}, 0x18) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) (async, rerun: 64) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000680)={&(0x7f0000000740)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002abd7000ffdbdf25010000000c00020000080000000000000c000500080000000000000006000a00e57b00003400078008000100", @ANYRES32, @ANYBLOB="08101aec21565401000100d7010000000100000072b9a9801cc46606c80add8cd6a14a1e37104575aeceedc85fac43528407d2d63392c2aee87dd1d1c7126cb2d8cee118a7535435077867b00e91935ad3484de0d7a5a4f9fa10b37c50fab0bccef1b1891daa973ad9db7a5e91339e30df2a430e8675293f4828c3aa1c8b2c5ef84b73eb37c390eff49f1aeb0b2bea20f5f1444404d7ec3b54cd22253aa0000688534acffbd55337626e2d5df1b50de801cd13eb08660266658bdd9debd6", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="0800010000000000"], 0x70}}, 0x8) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r4}}, 0x30) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/mnt\x00') 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x4, {0xa, 0x4e22, 0xdee, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10001}, r2}}, 0x38) socketpair(0x1d, 0x0, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000003c0)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000440)={0x9, 0x108, 0xfa00, {r3, 0x0, "dadaf6", "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"}}, 0x110) connect$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @bcast, @default, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000200)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000380)={0x800}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x800, 0x1, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x1000000, &(0x7f0000000780)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@mmap}], [{@obj_type={'obj_type', 0x3d, '$\\'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000240)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0), 0x13f, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x4, {0xa, 0x4e22, 0xdee, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10001}, r2}}, 0x38) (async) socketpair(0x1d, 0x0, 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000003c0), 0x111, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000440)={0x9, 0x108, 0xfa00, {r3, 0x0, "dadaf6", "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"}}, 0x110) (async) connect$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @bcast, @default, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) (async) ioctl$UFFDIO_CONTINUE(0xffffffffffffffff, 0xc020aa07, &(0x7f0000000200)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x1}) (async) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000380)={0x800}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x800, 0x1, &(0x7f0000000680)) (async) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x1000000, &(0x7f0000000780)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@mmap}], [{@obj_type={'obj_type', 0x3d, '$\\'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000240)) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x104, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8000}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000100)=0x7) 13:25:01 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r0}}, 0x30) 13:25:01 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r0}}, 0x30) 13:25:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000280), r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, '\x00', 0x2c}, 0xffff}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:01 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r0}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r0}}, 0x30) (async) 13:25:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200), 0x210c40, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000480)={0xa, 0x4, 0xfa00, {r3}}, 0xc) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000340)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x1}, @in={0x2, 0x4e22, @local}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x0, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000540)={0x7, 0x8, 0xfa00, {r7, 0x7fffffff}}, 0x10) (async) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f00000004c0)={'vcan0\x00'}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r5}}, 0x30) (async) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0xb0, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x72a0}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x5}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x18b}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4f2}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000000) 13:25:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000126bd7000fcdbdf250800000014000180060002000800000008000b0073697000080005000000000008000500000800000800040008000000"], 0x40}, 0x1, 0x0, 0x0, 0x4000014}, 0x4000010) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r1, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x9, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x138, 0x74, &(0x7f00000001c0)=""/116, 0x41100, 0x3, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x9, 0xee71, 0xdea8}, 0x10, 0xe072}, 0x80) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffea1, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r5}}, 0x30) 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x3}}}, 0x90) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x104, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8000}, r2}}, 0x30) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000100)=0x7) 13:25:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000280), r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, '\x00', 0x2c}, 0xffff}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000280), r1, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, '\x00', 0x2c}, 0xffff}}}, 0x90) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:01 executing program 0: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0xe61d11f603590d7, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x25}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x8010) (async) r0 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), 0xffffffffffffffff) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) socketpair(0x25, 0x1, 0x4, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x60, r0, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, ':'}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0xc000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x2, {0xa, 0x4e20, 0x6, @private1, 0x4}, r4}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r6}}, 0x18) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) (async) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000680)={&(0x7f0000000740)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002abd7000ffdbdf25010000000c00020000080000000000000c000500080000000000000006000a00e57b00003400078008000100", @ANYRES32, @ANYBLOB="08101aec21565401000100d7010000000100000072b9a9801cc46606c80add8cd6a14a1e37104575aeceedc85fac43528407d2d63392c2aee87dd1d1c7126cb2d8cee118a7535435077867b00e91935ad3484de0d7a5a4f9fa10b37c50fab0bccef1b1891daa973ad9db7a5e91339e30df2a430e8675293f4828c3aa1c8b2c5ef84b73eb37c390eff49f1aeb0b2bea20f5f1444404d7ec3b54cd22253aa0000688534acffbd55337626e2d5df1b50de801cd13eb08660266658bdd9debd6", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="0800010000000000"], 0x70}}, 0x8) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r4}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/mnt\x00') 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x3}}}, 0x90) 13:25:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000126bd7000fcdbdf250800000014000180060002000800000008000b0073697000080005000000000008000500000800000800040008000000"], 0x40}, 0x1, 0x0, 0x0, 0x4000014}, 0x4000010) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r1, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x9, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x138, 0x74, &(0x7f00000001c0)=""/116, 0x41100, 0x3, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x9, 0xee71, 0xdea8}, 0x10, 0xe072}, 0x80) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffea1, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r5}}, 0x30) socket$inet6_udp(0xa, 0x2, 0x0) (async) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000126bd7000fcdbdf250800000014000180060002000800000008000b0073697000080005000000000008000500000800000800040008000000"], 0x40}, 0x1, 0x0, 0x0, 0x4000014}, 0x4000010) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r1, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x9, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x138, 0x74, &(0x7f00000001c0)=""/116, 0x41100, 0x3, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x9, 0xee71, 0xdea8}, 0x10, 0xe072}, 0x80) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffea1, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r5}}, 0x30) (async) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x104, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8000}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000100)=0x7) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x104, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8000}, r2}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f0000000100)=0x7) (async) 13:25:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200), 0x210c40, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000480)={0xa, 0x4, 0xfa00, {r3}}, 0xc) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000340)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x1, @mcast2, 0x1}, @in={0x2, 0x4e22, @local}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180), 0x0, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000540)={0x7, 0x8, 0xfa00, {r7, 0x7fffffff}}, 0x10) (async) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f00000004c0)={'vcan0\x00'}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r5}}, 0x30) (async) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0xb0, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x72a0}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x5}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x18b}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4f2}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000000) 13:25:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000280), r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, '\x00', 0x2c}, 0xffff}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000280), r1, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, '\x00', 0x2c}, 0xffff}}}, 0x90) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x3}}}, 0x90) 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3ff}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x8, @local, 0x1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000126bd7000fcdbdf250800000014000180060002000800000008000b0073697000080005000000000008000500000800000800040008000000"], 0x40}, 0x1, 0x0, 0x0, 0x4000014}, 0x4000010) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r1, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_ext={0x1c, 0x9, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x138, 0x74, &(0x7f00000001c0)=""/116, 0x41100, 0x3, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000280)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x9, 0xee71, 0xdea8}, 0x10, 0xe072}, 0x80) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0xfffffea1, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, r5}}, 0x30) 13:25:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x1, {"54e05e93bae9c2dffe7a402b4567412d"}, 0x246, 0x5, 0x3}, @in6={0xa, 0x4e23, 0x3, @remote, 0x80000000}}}, 0x118) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300)={0xffffffffffffffff}, 0x3b, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e24, @private=0xa010101}}}, 0x90) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x1, "ba74f5", "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"}}, 0x110) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r4}, 0x10) 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3ff}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3ff}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x8, @local, 0x1}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x8}}, 0x90) 13:25:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300)={0xffffffffffffffff}, 0x3b, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e24, @private=0xa010101}}}, 0x90) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x1, "ba74f5", "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"}}, 0x110) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r4}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x2, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300), 0x3b, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e24, @private=0xa010101}}}, 0x90) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x1, "ba74f5", "0a593932b9984773849a0e2726bfbb6e381460ff1e79036b65cf32af8fdcf6f0fa19fbb6f9c7b26bee10fed042ba8d9c808a09ebb0238e5bdf9bbe8a09bddc3942dfa9f50eb0a9d85817500158cd887cecb050e9a1cb08f5bc864dcb3c403dc84ad8b0b29a4894a9a2ce68eced210d7ace5f1193f5894439408f984b1b1f4fc21680edf901dc0c11050bf86416f21587a6b188285686b7ef6b604408d35f3b4a349cbc7b85102b5cf4cc496dd18525a0c8327218fa3f0a7bf6aa752c75a5c01fad005051be87ddb1e93da7fd8be19449cffc58e3ba202058804b113f7944054973d6d5a106e42f087d410f07a95db1b7af99854817b3f56d99ecff0041603851"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r4}, 0x10) (async) 13:25:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x1, {"54e05e93bae9c2dffe7a402b4567412d"}, 0x246, 0x5, 0x3}, @in6={0xa, 0x4e23, 0x3, @remote, 0x80000000}}}, 0x118) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:01 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r0}}, 0x30) 13:25:01 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r0}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r0}}, 0x30) (async) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x8, @local, 0x1}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:01 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r0}}, 0x30) 13:25:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) bind$vsock_dgram(r1, &(0x7f0000000b40)={0x28, 0x0, 0x0, @my=0x1}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r3, 0xc0487c04, &(0x7f0000000200)={0x0, 0x7, 0x0, &(0x7f00000002c0)=[{}, {0x80000000}, {}, {}, {}, {}, {}], 0x9, 0x0, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x4, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}], 0xa, 0x0, &(0x7f0000000b80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$MEDIA_IOC_SETUP_LINK(r3, 0xc0347c03, &(0x7f0000000ac0)={{r5, 0x0, 0x1, [0x1, 0x5de]}, {0x80000000, 0x0, 0x2, [0x4, 0x80]}, 0x0, [0xd5ac, 0x4]}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000009c0)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000a40)={0x10, 0x30, 0xfa00, {&(0x7f0000000980), 0x4, {0xa, 0x4e21, 0x0, @local, 0x1}, r7}}, 0x38) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x4e22, 0x2, @mcast2, 0x1}, r6}}, 0x38) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000140)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) prctl$PR_SET_FPEMU(0xa, 0x0) 13:25:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x1, {"54e05e93bae9c2dffe7a402b4567412d"}, 0x246, 0x5, 0x3}, @in6={0xa, 0x4e23, 0x3, @remote, 0x80000000}}}, 0x118) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3ff}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3ff}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) 13:25:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x8}}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x8}}, 0x90) (async) 13:25:01 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000300)={0xffffffffffffffff}, 0x3b, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in={0x2, 0x4e24, @private=0xa010101}}}, 0x90) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x1, "ba74f5", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r4}, 0x10) (rerun: 32) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000140)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) prctl$PR_SET_FPEMU(0xa, 0x0) 13:25:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r2, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @ib={0x1b, 0x8, 0x80, {"bbb9867773b8e53fc0fcb7c607c8c86f"}, 0x7, 0x211b, 0x7ef}}}, 0x118) 13:25:01 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) bind$vsock_dgram(r1, &(0x7f0000000b40)={0x28, 0x0, 0x0, @my=0x1}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r3, 0xc0487c04, &(0x7f0000000200)={0x0, 0x7, 0x0, &(0x7f00000002c0)=[{}, {0x80000000}, {}, {}, {}, {}, {}], 0x9, 0x0, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x4, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}], 0xa, 0x0, &(0x7f0000000b80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$MEDIA_IOC_SETUP_LINK(r3, 0xc0347c03, &(0x7f0000000ac0)={{r5, 0x0, 0x1, [0x1, 0x5de]}, {0x80000000, 0x0, 0x2, [0x4, 0x80]}, 0x0, [0xd5ac, 0x4]}) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000009c0)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000a40)={0x10, 0x30, 0xfa00, {&(0x7f0000000980), 0x4, {0xa, 0x4e21, 0x0, @local, 0x1}, r7}}, 0x38) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x4e22, 0x2, @mcast2, 0x1}, r6}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) (async) bind$vsock_dgram(r1, &(0x7f0000000b40)={0x28, 0x0, 0x0, @my=0x1}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$MEDIA_IOC_G_TOPOLOGY(r3, 0xc0487c04, &(0x7f0000000200)={0x0, 0x7, 0x0, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}], 0x9, 0x0, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x4, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}], 0xa, 0x0, &(0x7f0000000b80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) (async) ioctl$MEDIA_IOC_SETUP_LINK(r3, 0xc0347c03, &(0x7f0000000ac0)={{r5, 0x0, 0x1, [0x1, 0x5de]}, {0x80000000, 0x0, 0x2, [0x4, 0x80]}, 0x0, [0xd5ac, 0x4]}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000009c0), 0x2, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000a40)={0x10, 0x30, 0xfa00, {&(0x7f0000000980), 0x4, {0xa, 0x4e21, 0x0, @local, 0x1}, r7}}, 0x38) (async) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x4e22, 0x2, @mcast2, 0x1}, r6}}, 0x38) (async) 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @host}, 0x10) connect$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r2, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @ib={0x1b, 0x8, 0x80, {"bbb9867773b8e53fc0fcb7c607c8c86f"}, 0x7, 0x211b, 0x7ef}}}, 0x118) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x5}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r2, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @ib={0x1b, 0x8, 0x80, {"bbb9867773b8e53fc0fcb7c607c8c86f"}, 0x7, 0x211b, 0x7ef}}}, 0x118) (async) 13:25:01 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000140)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) prctl$PR_SET_FPEMU(0xa, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000140)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) prctl$PR_SET_FPEMU(0xa, 0x0) (async) 13:25:01 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x8}}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x8}}, 0x90) (async) 13:25:01 executing program 3: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x7fff, 0x0, 0x1}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000140)={0xfffffffffffffffd, r0}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @host}, 0x10) connect$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @host}, 0x10) (async) connect$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) 13:25:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) bind$vsock_dgram(r1, &(0x7f0000000b40)={0x28, 0x0, 0x0, @my=0x1}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r3, 0xc0487c04, &(0x7f0000000200)={0x0, 0x7, 0x0, &(0x7f00000002c0)=[{}, {0x80000000}, {}, {}, {}, {}, {}], 0x9, 0x0, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x4, 0x0, &(0x7f0000000180)=[{}, {}, {}, {}], 0xa, 0x0, &(0x7f0000000b80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$MEDIA_IOC_SETUP_LINK(r3, 0xc0347c03, &(0x7f0000000ac0)={{r5, 0x0, 0x1, [0x1, 0x5de]}, {0x80000000, 0x0, 0x2, [0x4, 0x80]}, 0x0, [0xd5ac, 0x4]}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000a00)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000009c0)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000a40)={0x10, 0x30, 0xfa00, {&(0x7f0000000980), 0x4, {0xa, 0x4e21, 0x0, @local, 0x1}, r7}}, 0x38) (async) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4, {0xa, 0x4e22, 0x2, @mcast2, 0x1}, r6}}, 0x38) 13:25:02 executing program 3: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x7fff, 0x0, 0x1}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000140)={0xfffffffffffffffd, r0}) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r2, 0x0, 0x2, 0x4}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (rerun: 64) 13:25:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r2, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @ib={0x1b, 0x8, 0x80, {"bbb9867773b8e53fc0fcb7c607c8c86f"}, 0x7, 0x211b, 0x7ef}}}, 0x118) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0x5}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r2, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @ib={0x1b, 0x8, 0x80, {"bbb9867773b8e53fc0fcb7c607c8c86f"}, 0x7, 0x211b, 0x7ef}}}, 0x118) (async) 13:25:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x34}}, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @host}, 0x10) (async) connect$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x34}}, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180), 0x101100, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r1, r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x129080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x100, @mcast1, 0x3}, r1}}, 0x30) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), 0xffffffffffffffff, r0}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0xfffffffe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2f9}, r5}}, 0x30) 13:25:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) openat$vmci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x3}, r1}}, 0x30) 13:25:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$BATADV_CMD_GET_VLAN(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x34}}, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:02 executing program 1: write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @private0, 0xffff}}}, 0x30) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) openat$vmci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) (async) openat$vmci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x3}, r1}}, 0x30) (async) 13:25:02 executing program 3: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x7fff, 0x0, 0x1}) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000140)={0xfffffffffffffffd, r0}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x7fff, 0x0, 0x1}) (async) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000140)={0xfffffffffffffffd, r0}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r2, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) 13:25:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:02 executing program 1: write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @private0, 0xffff}}}, 0x30) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0xa, 0x4, 0xfa00, {r3}}, 0xc) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) openat$vmci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) (async) openat$vmci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x3}, r1}}, 0x30) (async) 13:25:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180), 0x101100, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r1, r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x129080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x100, @mcast1, 0x3}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), 0xffffffffffffffff, r0}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0xfffffffe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2f9}, r5}}, 0x30) 13:25:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x2, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:02 executing program 1: write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @private0, 0xffff}}}, 0x30) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x1ff, @loopback, 0xfb}}}, 0x90) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x80083, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000900)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x140, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xfe}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netpci0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x80}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dvmrp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe9}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1e}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xeb2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x276b}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x140}, 0x1, 0x0, 0x0, 0x40001}, 0x4008000) socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x586, 0x61, &(0x7f00000002c0)=""/97, 0x41100, 0x7, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000480)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0x9, 0x7ff, 0x995a}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r3, r1, 0xffffffffffffffff, r1]}, 0x80) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r5, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 13:25:02 executing program 4: accept4$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast}, [@null, @rose, @remote, @netrom, @bcast, @rose, @rose, @bcast]}, &(0x7f0000000180)=0x48, 0x80800) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x2, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180), 0x101100, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r1, r3}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x129080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x100, @mcast1, 0x3}, r1}}, 0x30) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), 0xffffffffffffffff, r0}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0xfffffffe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2f9}, r5}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180), 0x101100, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f00000001c0), r1, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x129080, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000003c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x100, @mcast1, 0x3}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), 0xffffffffffffffff, r0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0xfffffffe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2f9}, r5}}, 0x30) (async) 13:25:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 13:25:02 executing program 4: accept4$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast}, [@null, @rose, @remote, @netrom, @bcast, @rose, @rose, @bcast]}, &(0x7f0000000180)=0x48, 0x80800) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) accept4$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast}, [@null, @rose, @remote, @netrom, @bcast, @rose, @rose, @bcast]}, &(0x7f0000000180)=0x48, 0x80800) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="d0010000", @ANYRES16=0x0, @ANYBLOB="040027bd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="f400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000008000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004001f00000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r2, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400ff010000080007000000000008000100", @ANYRES32=r4, @ANYBLOB="b8000280400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400a604000008000600", @ANYRES32=r6, @ANYBLOB="3c00011000656e61626c656400000000ef000000000000000000000000000000000200000000000000ed0004000476aa68a9fbd1c8f6", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040007000000"], 0x1d0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8000, 0x0, @remote, 0x3}, r7}}, 0x30) 13:25:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 13:25:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="d0010000", @ANYRES16=0x0, @ANYBLOB="040027bd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="f400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000008000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004001f00000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r2, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400ff010000080007000000000008000100", @ANYRES32=r4, @ANYBLOB="b8000280400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400a604000008000600", @ANYRES32=r6, @ANYBLOB="3c00011000656e61626c656400000000ef000000000000000000000000000000000200000000000000ed0004000476aa68a9fbd1c8f6", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040007000000"], 0x1d0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8000, 0x0, @remote, 0x3}, r7}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="d0010000", @ANYRES16=0x0, @ANYBLOB="040027bd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="f400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000008000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004001f00000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r2, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400ff010000080007000000000008000100", @ANYRES32=r4, @ANYBLOB="b8000280400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400a604000008000600", @ANYRES32=r6, @ANYBLOB="3c00011000656e61626c656400000000ef000000000000000000000000000000000200000000000000ed0004000476aa68a9fbd1c8f6", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040007000000"], 0x1d0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) (async) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8000, 0x0, @remote, 0x3}, r7}}, 0x30) (async) 13:25:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:02 executing program 4: accept4$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @bcast}, [@null, @rose, @remote, @netrom, @bcast, @rose, @rose, @bcast]}, &(0x7f0000000180)=0x48, 0x80800) (async, rerun: 32) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x1ff, @loopback, 0xfb}}}, 0x90) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x80083, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000900)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x140, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xfe}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netpci0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x80}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dvmrp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe9}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1e}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xeb2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x276b}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x140}, 0x1, 0x0, 0x0, 0x40001}, 0x4008000) socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x586, 0x61, &(0x7f00000002c0)=""/97, 0x41100, 0x7, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000480)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0x9, 0x7ff, 0x995a}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r3, r1, 0xffffffffffffffff, r1]}, 0x80) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r5, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 13:25:02 executing program 5: write$tun(0xffffffffffffffff, &(0x7f0000000180)={@void, @void, @ipv6=@generic={0x5, 0x6, "16e685", 0xfc, 0x29, 0xff, @remote, @mcast1, {[@srh={0x21, 0x6, 0x4, 0x3, 0x20, 0x10, 0x3f, [@dev={0xfe, 0x80, '\x00', 0x95}, @loopback, @private0={0xfc, 0x0, '\x00', 0x1}]}, @fragment={0x2, 0x0, 0x2, 0x1, 0x0, 0x1b, 0x66}], "8930885082cd2e909e1af88903fd549374eb5d915268295e8b0cc72e63701a58949ce1fc0933acee56251f1cd2a1f23c5e4c47125423ab1a59b4e5fcb1ccfba7a9dca1d44098fec627619bfe5aa69b8b6d0210feeba8983d0cb190039f6f415619752c348237856700fbea19391d192ab8923d5a3f1a472b32727f07271ddd22b0d649a9bef3c96e237a105cbeff864e4c504132f653561ba3c67bed971bb916e0f7bcb7dd2fd7bf6aa44505c57f1a9787bf48bab2c179cefbab2094"}}}, 0x124) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000080)=0xa33) 13:25:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r3}}, 0xc) (async) 13:25:02 executing program 5: write$tun(0xffffffffffffffff, &(0x7f0000000180)={@void, @void, @ipv6=@generic={0x5, 0x6, "16e685", 0xfc, 0x29, 0xff, @remote, @mcast1, {[@srh={0x21, 0x6, 0x4, 0x3, 0x20, 0x10, 0x3f, [@dev={0xfe, 0x80, '\x00', 0x95}, @loopback, @private0={0xfc, 0x0, '\x00', 0x1}]}, @fragment={0x2, 0x0, 0x2, 0x1, 0x0, 0x1b, 0x66}], "8930885082cd2e909e1af88903fd549374eb5d915268295e8b0cc72e63701a58949ce1fc0933acee56251f1cd2a1f23c5e4c47125423ab1a59b4e5fcb1ccfba7a9dca1d44098fec627619bfe5aa69b8b6d0210feeba8983d0cb190039f6f415619752c348237856700fbea19391d192ab8923d5a3f1a472b32727f07271ddd22b0d649a9bef3c96e237a105cbeff864e4c504132f653561ba3c67bed971bb916e0f7bcb7dd2fd7bf6aa44505c57f1a9787bf48bab2c179cefbab2094"}}}, 0x124) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000080)=0xa33) 13:25:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="d0010000", @ANYRES16=0x0, @ANYBLOB="040027bd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="f400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000008000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004001f00000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r2, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400ff010000080007000000000008000100", @ANYRES32=r4, @ANYBLOB="b8000280400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400a604000008000600", @ANYRES32=r6, @ANYBLOB="3c00011000656e61626c656400000000ef000000000000000000000000000000000200000000000000ed0004000476aa68a9fbd1c8f6", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040007000000"], 0x1d0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8000, 0x0, @remote, 0x3}, r7}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="d0010000", @ANYRES16=0x0, @ANYBLOB="040027bd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="f400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000008000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004001f00000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r2, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400ff010000080007000000000008000100", @ANYRES32=r4, @ANYBLOB="b8000280400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400a604000008000600", @ANYRES32=r6, @ANYBLOB="3c00011000656e61626c656400000000ef000000000000000000000000000000000200000000000000ed0004000476aa68a9fbd1c8f6", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040007000000"], 0x1d0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) (async) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8000, 0x0, @remote, 0x3}, r7}}, 0x30) (async) 13:25:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) 13:25:02 executing program 5: write$tun(0xffffffffffffffff, &(0x7f0000000180)={@void, @void, @ipv6=@generic={0x5, 0x6, "16e685", 0xfc, 0x29, 0xff, @remote, @mcast1, {[@srh={0x21, 0x6, 0x4, 0x3, 0x20, 0x10, 0x3f, [@dev={0xfe, 0x80, '\x00', 0x95}, @loopback, @private0={0xfc, 0x0, '\x00', 0x1}]}, @fragment={0x2, 0x0, 0x2, 0x1, 0x0, 0x1b, 0x66}], "8930885082cd2e909e1af88903fd549374eb5d915268295e8b0cc72e63701a58949ce1fc0933acee56251f1cd2a1f23c5e4c47125423ab1a59b4e5fcb1ccfba7a9dca1d44098fec627619bfe5aa69b8b6d0210feeba8983d0cb190039f6f415619752c348237856700fbea19391d192ab8923d5a3f1a472b32727f07271ddd22b0d649a9bef3c96e237a105cbeff864e4c504132f653561ba3c67bed971bb916e0f7bcb7dd2fd7bf6aa44505c57f1a9787bf48bab2c179cefbab2094"}}}, 0x124) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000080)=0xa33) 13:25:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x3, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:02 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in6={0xa, 0x4e24, 0x1ff, @loopback, 0xfb}}}, 0x90) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x80083, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000900)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)={0x140, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xfe}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'netpci0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x80}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dvmrp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe9}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1e}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xeb2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x276b}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x140}, 0x1, 0x0, 0x0, 0x40001}, 0x4008000) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x586, 0x61, &(0x7f00000002c0)=""/97, 0x41100, 0x7, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000480)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0x9, 0x7ff, 0x995a}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r3, r1, 0xffffffffffffffff, r1]}, 0x80) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r5, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r5}}, 0x10) 13:25:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x3, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x0, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) 13:25:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000200), 0x8864, 0x20000) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000240)={0x7f}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x400, @mcast1, 0x3}, r6}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) 13:25:02 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) (async) 13:25:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x3, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:02 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x1f}}, 0x10) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x2, {0x7, 0x3f, "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", 0x2, 0x7f, 0xff, 0x9, 0x80, 0x2}, r1}}, 0x128) 13:25:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x303800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x6, @local, 0x10001}, r3}}, 0x30) 13:25:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x1f}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x1f}}, 0x10) (async) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x2, {0x7, 0x3f, "ab8fc5b4fdd18df4b93ceb84663a095deb1776bad897c4648688c7bfc84192f3aa764649f4686b718c02dc923ac8f49d08861198e7f46b792ce8ef89ad8f61ceae8593c9133c74067101b103db0c5aec84bc75bac887443ddf5244ff3bad54b6becf1c6d0c65eb06ee18942ecc8c771ed0f190a319296eab05b23a42d9e578bd9ca16d467c887dd28f0debb401989a4f065fba06364a0554fead4823ea99042ad231dec1dafc8b020968e34458bcca9ba29cdfc1a906d46dc2e82087d3ba8d0c749bb5e8761ec6a4255779f6ce2e2573cda0c75b2b75e7eefffeffecbca45f43531ab95b035d5b61c5e472c0c8e34b64fe4d4eb7caaa5ce3fce7bcf31b6300f5", 0x2, 0x7f, 0xff, 0x9, 0x80, 0x2}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x2, {0x7, 0x3f, "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", 0x2, 0x7f, 0xff, 0x9, 0x80, 0x2}, r1}}, 0x128) (async) 13:25:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb84}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000200), 0x8864, 0x20000) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000240)={0x7f}) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x400, @mcast1, 0x3}, r6}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) 13:25:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x303800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x6, @local, 0x10001}, r3}}, 0x30) 13:25:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10000}, r2}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 13:25:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb84}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb84}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x303800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x6, @local, 0x10001}, r3}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100), 0x303800, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x2, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x6, @local, 0x10001}, r3}}, 0x30) (async) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x2, {0x7, 0x3f, "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", 0x2, 0x7f, 0xff, 0x9, 0x80, 0x2}, r1}}, 0x128) 13:25:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10000}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 13:25:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x1f}}, 0x10) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x10000000000004, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb84}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000200), 0x8864, 0x20000) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000240)={0x7f}) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x400, @mcast1, 0x3}, r6}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) (rerun: 64) 13:25:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10000}, r2}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x10000000000004, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x1}}, 0x3d) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r4}}, 0x18) 13:25:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r1, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x59, 0xfa00, {0x0, {0xa, 0x4e1e, 0xfffffffe, @local, 0x400db7f}, r1}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r1, r3}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xc04, 0xdf9, "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", 0x2, 0x8, 0xfa, 0x8, 0x6, 0x1f, 0x40, 0x1}, r3}}, 0x120) 13:25:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$userns(r1, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x6, "6e7ce9", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x10000000000004, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x208b00, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) (rerun: 64) syz_open_procfs$userns(r1, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x6, "6e7ce9", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x8ac3, 0x0, 0x0, 0x0, @ib={0x1b, 0x40, 0xffff6ac4, {"841f118b2443efb3c533943c3dbcb206"}, 0x1ff, 0x7f, 0x10000}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x80}}}, 0x118) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x1}}, 0x3d) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r4}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x1}}, 0x3d) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r4}}, 0x18) (async) 13:25:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xc04, 0xdf9, "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", 0x2, 0x8, 0xfa, 0x8, 0x6, 0x1f, 0x40, 0x1}, r3}}, 0x120) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x8ac3, 0x0, 0x0, 0x0, @ib={0x1b, 0x40, 0xffff6ac4, {"841f118b2443efb3c533943c3dbcb206"}, 0x1ff, 0x7f, 0x10000}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x80}}}, 0x118) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x8ac3, 0x0, 0x0, 0x0, @ib={0x1b, 0x40, 0xffff6ac4, {"841f118b2443efb3c533943c3dbcb206"}, 0x1ff, 0x7f, 0x10000}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x80}}}, 0x118) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) 13:25:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x208b00, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r1, 0x8}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x59, 0xfa00, {0x0, {0xa, 0x4e1e, 0xfffffffe, @local, 0x400db7f}, r1}}, 0x30) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r1, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x8ac3, 0x0, 0x0, 0x0, @ib={0x1b, 0x40, 0xffff6ac4, {"841f118b2443efb3c533943c3dbcb206"}, 0x1ff, 0x7f, 0x10000}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x80}}}, 0x118) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x8ac3, 0x0, 0x0, 0x0, @ib={0x1b, 0x40, 0xffff6ac4, {"841f118b2443efb3c533943c3dbcb206"}, 0x1ff, 0x7f, 0x10000}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x80}}}, 0x118) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) 13:25:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xc04, 0xdf9, "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", 0x2, 0x8, 0xfa, 0x8, 0x6, 0x1f, 0x40, 0x1}, r3}}, 0x120) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000100)={0x6, 0x118, 0xfa00, {{0xc04, 0xdf9, "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", 0x2, 0x8, 0xfa, 0x8, 0x6, 0x1f, 0x40, 0x1}, r3}}, 0x120) (async) 13:25:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x208b00, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0x1}}, 0x3d) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r4}}, 0x18) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000180)=[{0x4, 0x0, [0x9, 0x8, 0x1, 0x2, 0x3, 0x9, 0x1, 0x2, 0x1, 0x3f, 0xfffffff8, 0xfffffffb, 0x5, 0x20, 0xff, 0x9]}, {0x4, 0x0, [0x0, 0x5, 0xff, 0xe02, 0xff, 0x100, 0x101, 0x8, 0x6, 0x3, 0xfffff43e, 0x212fa7d4, 0x4, 0x1, 0x3, 0x235e9f33]}, {0x20, 0x0, [0xffff0001, 0x0, 0x1, 0x0, 0x7fffffff, 0x3, 0x0, 0x7, 0x7, 0xe4, 0x1, 0x6, 0x1000, 0x7ff, 0x7, 0x2]}], r1, 0x1, 0x1, 0xd8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$userns(r1, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x6, "6e7ce9", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020}, 0x2020) (async) syz_open_procfs$userns(r1, &(0x7f0000000080)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x6, "6e7ce9", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) (async) 13:25:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r1, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x59, 0xfa00, {0x0, {0xa, 0x4e1e, 0xfffffffe, @local, 0x400db7f}, r1}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r1, r3}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r1, 0x8}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x59, 0xfa00, {0x0, {0xa, 0x4e1e, 0xfffffffe, @local, 0x400db7f}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r1, r3}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in={0x2, 0x4e23, @remote}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r4, 0x5beb}}, 0x10) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000180)=[{0x4, 0x0, [0x9, 0x8, 0x1, 0x2, 0x3, 0x9, 0x1, 0x2, 0x1, 0x3f, 0xfffffff8, 0xfffffffb, 0x5, 0x20, 0xff, 0x9]}, {0x4, 0x0, [0x0, 0x5, 0xff, 0xe02, 0xff, 0x100, 0x101, 0x8, 0x6, 0x3, 0xfffff43e, 0x212fa7d4, 0x4, 0x1, 0x3, 0x235e9f33]}, {0x20, 0x0, [0xffff0001, 0x0, 0x1, 0x0, 0x7fffffff, 0x3, 0x0, 0x7, 0x7, 0xe4, 0x1, 0x6, 0x1000, 0x7ff, 0x7, 0x2]}], r1, 0x1, 0x1, 0xd8}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (rerun: 32) 13:25:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) userfaultfd(0x80000) r2 = userfaultfd(0x800) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, '\x00', 0x22}, 0x1ff}, r5}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r4, 0x45}}, 0x10) r6 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x800) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f00000001c0)={0xfcf, 0x0, 0x2}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) userfaultfd(0x80000) r2 = userfaultfd(0x800) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) userfaultfd(0x80000) (async) userfaultfd(0x800) (async) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000180)=[{0x4, 0x0, [0x9, 0x8, 0x1, 0x2, 0x3, 0x9, 0x1, 0x2, 0x1, 0x3f, 0xfffffff8, 0xfffffffb, 0x5, 0x20, 0xff, 0x9]}, {0x4, 0x0, [0x0, 0x5, 0xff, 0xe02, 0xff, 0x100, 0x101, 0x8, 0x6, 0x3, 0xfffff43e, 0x212fa7d4, 0x4, 0x1, 0x3, 0x235e9f33]}, {0x20, 0x0, [0xffff0001, 0x0, 0x1, 0x0, 0x7fffffff, 0x3, 0x0, 0x7, 0x7, 0xe4, 0x1, 0x6, 0x1000, 0x7ff, 0x7, 0x2]}], r1, 0x1, 0x1, 0xd8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, '\x00', 0x22}, 0x1ff}, r5}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r4, 0x45}}, 0x10) (async) r6 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x800) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f00000001c0)={0xfcf, 0x0, 0x2}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xffffffffffffffff, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x2, 0x1}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x100, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000005c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x9, "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", 0x1f, 0x4, 0x81, 0x7, 0x52, 0x6, 0x4}, r4}}, 0x120) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x92800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x5d2, 0xff, "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", 0x2, 0x6, 0xff, 0x3, 0x6, 0x3, 0x2}, r6}}, 0x128) 13:25:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="540000c0", @ANYRES16=0x0, @ANYBLOB="000325bd7000ffdbdf25030000001c000a002f6465762f696a66696e6962616e642f72646d615f636d000c000400fbc20000000000000c00080081cd0000000000000c0004000900000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x2, {0xfff, 0xd38e, "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", 0x81, 0x8, 0x1f, 0x8, 0x5d, 0x2a}, r2}}, 0x128) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000200)={0xf, 0x8, 0xfa00, {r1, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x59, 0xfa00, {0x0, {0xa, 0x4e1e, 0xfffffffe, @local, 0x400db7f}, r1}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r1, r3}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) userfaultfd(0x80000) (async) r2 = userfaultfd(0x800) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in={0x2, 0x4e23, @remote}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r4, 0x5beb}}, 0x10) 13:25:03 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xffffffffffffffff, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x2, 0x1}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x100, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000005c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x9, "65743402f8ec3ccceb9062e98aee299adb9dac28a35368abeea19ac84208d5e31cc945251e4a29e8b7ad7d7027e5f2356df9b6fe267c258f9e33d587d47a3bd4746124ae5790b5ae34ba7a47f6f8270a3ad140a0873b2fb49ba7aa4c27c0702fc20c5208bf40a1da8ae4098ee3b498bbf43b71b680026131280b1350f5cbc347fdab869dd73f4d490d1c49fa8062f805030a65a9b3baaef74dcd5772a940ae55f5e0150f8dd17ac9c392e75aed4934dd004816ff64d4c25a12912883c92c1616e0a31289a806274da6738acd27cb4077bf30cc6225743404a51da8a941fc4e4ced59f4b5787fe9f02258195ad3c412526cf08a52c56fd1796cf4f74732e06ae8", 0x1f, 0x4, 0x81, 0x7, 0x52, 0x6, 0x4}, r4}}, 0x120) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x92800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x5d2, 0xff, "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", 0x2, 0x6, 0xff, 0x3, 0x6, 0x3, 0x2}, r6}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, 0xffffffffffffffff, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x2, 0x1}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x100, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}, r2}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000005c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x9, "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", 0x1f, 0x4, 0x81, 0x7, 0x52, 0x6, 0x4}, r4}}, 0x120) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x92800, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0), 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x5d2, 0xff, "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", 0x2, 0x6, 0xff, 0x3, 0x6, 0x3, 0x2}, r6}}, 0x128) (async) 13:25:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="540000c0", @ANYRES16=0x0, @ANYBLOB="000325bd7000ffdbdf25030000001c000a002f6465762f696a66696e6962616e642f72646d615f636d000c000400fbc20000000000000c00080081cd0000000000000c0004000900000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x2, {0xfff, 0xd38e, "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", 0x81, 0x8, 0x1f, 0x8, 0x5d, 0x2a}, r2}}, 0x128) (rerun: 64) 13:25:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000002c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, '\x00', 0x22}, 0x1ff}, r5}}, 0x30) (async, rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r4, 0x45}}, 0x10) (async, rerun: 32) r6 = syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x800) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f00000001c0)={0xfcf, 0x0, 0x2}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:03 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_open_procfs$userns(r1, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x6, "6e7ce9", "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"}}, 0x110) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r2}}, 0x30) 13:25:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10000}, r2}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 13:25:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="540000c0", @ANYRES16=0x0, @ANYBLOB="000325bd7000ffdbdf25030000001c000a002f6465762f696a66696e6962616e642f72646d615f636d000c000400fbc20000000000000c00080081cd0000000000000c0004000900000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x2, {0xfff, 0xd38e, "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", 0x81, 0x8, 0x1f, 0x8, 0x5d, 0x2a}, r2}}, 0x128) (rerun: 32) 13:25:03 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000200), 0x8864, 0x20000) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000240)={0x7f}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r6}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x400, @mcast1, 0x3}, r6}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) 13:25:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0xffffffffffffffff, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x2, 0x1}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x100, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000005c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x9, "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", 0x1f, 0x4, 0x81, 0x7, 0x52, 0x6, 0x4}, r4}}, 0x120) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x92800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x5d2, 0xff, "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", 0x2, 0x6, 0xff, 0x3, 0x6, 0x3, 0x2}, r6}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, 0xffffffffffffffff, 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x2, 0x1}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x100, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7}, r2}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000005c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000400)={0x6, 0x118, 0xfa00, {{0x0, 0x9, "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", 0x1f, 0x4, 0x81, 0x7, 0x52, 0x6, 0x4}, r4}}, 0x120) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240), 0x92800, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0), 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x4, {0x5d2, 0xff, "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", 0x2, 0x6, 0xff, 0x3, 0x6, 0x3, 0x2}, r6}}, 0x128) (async) 13:25:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="d0010000", @ANYRES16=0x0, @ANYBLOB="040027bd7000fcdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="f400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000008000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004001f00000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r2, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400ff010000080007000000000008000100", @ANYRES32=r4, @ANYBLOB="b8000280400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400a604000008000600", @ANYRES32=r6, @ANYBLOB="3c00011000656e61626c656400000000ef000000000000000000000000000000000200000000000000ed0004000476aa68a9fbd1c8f6", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040007000000"], 0x1d0}, 0x1, 0x0, 0x0, 0x8000}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x8000, 0x0, @remote, 0x3}, r7}}, 0x30) 13:25:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in={0x2, 0x4e23, @remote}}}, 0x90) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r4, 0x5beb}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in={0x2, 0x4e23, @remote}}}, 0x90) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f, 0x9}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000280)={0x7, 0x8, 0xfa00, {r4, 0x5beb}}, 0x10) (async) 13:25:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000007c0)='pwc_handler_enter\x00'}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x10, 0x0, [0xc09, 0x40, 0x7, 0x9, 0xffff, 0x6de0, 0x8, 0x3, 0xfffffffa, 0xf58, 0x7fff, 0x101, 0x9, 0x8, 0x2, 0x3]}, {0x8, 0x0, [0xdd, 0x4, 0x0, 0x1, 0x10001, 0x6, 0x1, 0x7fffffff, 0x5, 0x4, 0x9, 0x6, 0x3ff, 0xfff, 0x2ac, 0x10001]}, {0x2, 0x0, [0xc412, 0x9, 0x0, 0x3, 0x952c, 0x8, 0x9c, 0x2, 0x7fff, 0x1, 0x9, 0x8, 0x4, 0x1000, 0x8, 0x2]}, {0x0, 0x0, [0x8, 0x4, 0xfff, 0x6, 0x8000, 0x80000000, 0x2, 0xffff, 0x9, 0x4, 0x0, 0x2, 0x80, 0x7, 0x6, 0x7]}, {0x0, 0x0, [0x7b1, 0x5, 0x40, 0x200, 0x572, 0x2, 0xfffffffd, 0x3, 0x8, 0x1, 0x6, 0x7, 0x5, 0x80d6, 0x9b, 0x5]}, {0x5, 0x0, [0x8, 0x9c3, 0xb4a9, 0xfffffff7, 0x2, 0x5, 0xfffffff8, 0x1, 0x401, 0x7, 0x47, 0x1, 0xa9b, 0x3, 0x3, 0x7]}, {0x0, 0x0, [0x5, 0x59, 0x400, 0x0, 0x9, 0xffff, 0x80, 0x180, 0x2, 0x8, 0xffff, 0xbbb, 0x9, 0x4, 0x26, 0xffff]}, {0x0, 0x0, [0x2, 0x6, 0x8000, 0x41, 0x0, 0x5, 0xfff, 0x3, 0x7, 0x7ff, 0x81, 0x2, 0x5, 0x5, 0x3, 0x101]}, {0x0, 0x0, [0x0, 0x10001, 0x9, 0x8, 0x1, 0x7, 0x5, 0x81, 0x8001, 0x7, 0x6, 0x9, 0x4, 0xff8, 0xffffffff]}], r3, 0x1, 0x1, 0x288}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$midi(r6, &(0x7f00000002c0)="5c13b145d2dc5689edb1daf06982c6679055f02aad29004c28550825b31e47542855596de7500575cadde6e3f301bfd2471c3ace5ac897bb0cccc0d6d7fb22f76523535248602d1f4d2fc257cace80cb7c941b6f28", 0x55) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000680)={0x6, 0x118, 0xfa00, {{0x200, 0x54, "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", 0x3, 0x1, 0x3, 0x2, 0x78, 0x0, 0x9, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r5}}, 0xc) 13:25:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r2, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}, @ib={0x1b, 0x8, 0x80, {"bbb9867773b8e53fc0fcb7c607c8c86f"}, 0x7, 0x211b, 0x7ef}}}, 0x118) 13:25:04 executing program 1: sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0xe61d11f603590d7, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x25}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x8010) r0 = syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), 0xffffffffffffffff) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) socketpair(0x25, 0x1, 0x4, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x60, r0, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, ':'}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0xc000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x2, {0xa, 0x4e20, 0x6, @private1, 0x4}, r4}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r6}}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000680)={&(0x7f0000000740)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002abd7000ffdbdf25010000000c00020000080000000000000c000500080000000000000006000a00e57b00003400078008000100", @ANYRES32, @ANYBLOB="08101aec21565401000100d7010000000100000072b9a9801cc46606c80add8cd6a14a1e37104575aeceedc85fac43528407d2d63392c2aee87dd1d1c7126cb2d8cee118a7535435077867b00e91935ad3484de0d7a5a4f9fa10b37c50fab0bccef1b1891daa973ad9db7a5e91339e30df2a430e8675293f4828c3aa1c8b2c5ef84b73eb37c390eff49f1aeb0b2bea20f5f1444404d7ec3b54cd22253aa0000688534acffbd55337626e2d5df1b50de801cd13eb08660266658bdd9debd6", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="0800010000000000"], 0x70}}, 0x8) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/mnt\x00') 13:25:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x1}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340), 0x400000, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r3}}, 0x30) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x0, 0x5, "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", 0x6, 0xb8, 0x7, 0x8, 0x7, 0x1f, 0x0, 0x1}, r3}}, 0x120) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x3f, 0x8, 0x9, 0x28, @private2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x5, 0xfffffffa}}) sendto$packet(r1, &(0x7f0000000500)="4274c3e19e4bc8ef06eecca6b8612c1674f88dfef9b8191ea5865d84ef8e3a83d735e294eef93ca53bcebc877e1b5397c94897fd59ef4045a3e775675eda6898622a5500207def44ecfcc5def226080254d4bec91cd23d37f4b5e1d18b1f0285681b8c6501b39e7aeb7c863f672acf6c606fd969a6d1659897d5c1f6141428ea2132b127aecba7c2e34945e382650d48fded3021205cddc77199208656732e1dffa88d6153", 0xa5, 0x4090, &(0x7f00000005c0)={0x11, 0x10, r7, 0x1, 0x6, 0x6, @random="37197759945a"}, 0x14) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e23, 0x7fffffff, @mcast2, 0x65}, r3}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f00000004c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000480)}}, 0x18) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000100)={0xf, 0x8}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, '\x00', 0x30}, 0x1}}}, 0x30) write$RDMA_USER_CM_CMD_BIND(r8, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x4, @private2, 0x5}}}, 0x90) 13:25:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x1}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000007c0)='pwc_handler_enter\x00'}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x10, 0x0, [0xc09, 0x40, 0x7, 0x9, 0xffff, 0x6de0, 0x8, 0x3, 0xfffffffa, 0xf58, 0x7fff, 0x101, 0x9, 0x8, 0x2, 0x3]}, {0x8, 0x0, [0xdd, 0x4, 0x0, 0x1, 0x10001, 0x6, 0x1, 0x7fffffff, 0x5, 0x4, 0x9, 0x6, 0x3ff, 0xfff, 0x2ac, 0x10001]}, {0x2, 0x0, [0xc412, 0x9, 0x0, 0x3, 0x952c, 0x8, 0x9c, 0x2, 0x7fff, 0x1, 0x9, 0x8, 0x4, 0x1000, 0x8, 0x2]}, {0x0, 0x0, [0x8, 0x4, 0xfff, 0x6, 0x8000, 0x80000000, 0x2, 0xffff, 0x9, 0x4, 0x0, 0x2, 0x80, 0x7, 0x6, 0x7]}, {0x0, 0x0, [0x7b1, 0x5, 0x40, 0x200, 0x572, 0x2, 0xfffffffd, 0x3, 0x8, 0x1, 0x6, 0x7, 0x5, 0x80d6, 0x9b, 0x5]}, {0x5, 0x0, [0x8, 0x9c3, 0xb4a9, 0xfffffff7, 0x2, 0x5, 0xfffffff8, 0x1, 0x401, 0x7, 0x47, 0x1, 0xa9b, 0x3, 0x3, 0x7]}, {0x0, 0x0, [0x5, 0x59, 0x400, 0x0, 0x9, 0xffff, 0x80, 0x180, 0x2, 0x8, 0xffff, 0xbbb, 0x9, 0x4, 0x26, 0xffff]}, {0x0, 0x0, [0x2, 0x6, 0x8000, 0x41, 0x0, 0x5, 0xfff, 0x3, 0x7, 0x7ff, 0x81, 0x2, 0x5, 0x5, 0x3, 0x101]}, {0x0, 0x0, [0x0, 0x10001, 0x9, 0x8, 0x1, 0x7, 0x5, 0x81, 0x8001, 0x7, 0x6, 0x9, 0x4, 0xff8, 0xffffffff]}], r3, 0x1, 0x1, 0x288}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$midi(r6, &(0x7f00000002c0)="5c13b145d2dc5689edb1daf06982c6679055f02aad29004c28550825b31e47542855596de7500575cadde6e3f301bfd2471c3ace5ac897bb0cccc0d6d7fb22f76523535248602d1f4d2fc257cace80cb7c941b6f28", 0x55) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000680)={0x6, 0x118, 0xfa00, {{0x200, 0x54, "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", 0x3, 0x1, 0x3, 0x2, 0x78, 0x0, 0x9, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r5}}, 0xc) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000007c0)='pwc_handler_enter\x00'}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x10, 0x0, [0xc09, 0x40, 0x7, 0x9, 0xffff, 0x6de0, 0x8, 0x3, 0xfffffffa, 0xf58, 0x7fff, 0x101, 0x9, 0x8, 0x2, 0x3]}, {0x8, 0x0, [0xdd, 0x4, 0x0, 0x1, 0x10001, 0x6, 0x1, 0x7fffffff, 0x5, 0x4, 0x9, 0x6, 0x3ff, 0xfff, 0x2ac, 0x10001]}, {0x2, 0x0, [0xc412, 0x9, 0x0, 0x3, 0x952c, 0x8, 0x9c, 0x2, 0x7fff, 0x1, 0x9, 0x8, 0x4, 0x1000, 0x8, 0x2]}, {0x0, 0x0, [0x8, 0x4, 0xfff, 0x6, 0x8000, 0x80000000, 0x2, 0xffff, 0x9, 0x4, 0x0, 0x2, 0x80, 0x7, 0x6, 0x7]}, {0x0, 0x0, [0x7b1, 0x5, 0x40, 0x200, 0x572, 0x2, 0xfffffffd, 0x3, 0x8, 0x1, 0x6, 0x7, 0x5, 0x80d6, 0x9b, 0x5]}, {0x5, 0x0, [0x8, 0x9c3, 0xb4a9, 0xfffffff7, 0x2, 0x5, 0xfffffff8, 0x1, 0x401, 0x7, 0x47, 0x1, 0xa9b, 0x3, 0x3, 0x7]}, {0x0, 0x0, [0x5, 0x59, 0x400, 0x0, 0x9, 0xffff, 0x80, 0x180, 0x2, 0x8, 0xffff, 0xbbb, 0x9, 0x4, 0x26, 0xffff]}, {0x0, 0x0, [0x2, 0x6, 0x8000, 0x41, 0x0, 0x5, 0xfff, 0x3, 0x7, 0x7ff, 0x81, 0x2, 0x5, 0x5, 0x3, 0x101]}, {0x0, 0x0, [0x0, 0x10001, 0x9, 0x8, 0x1, 0x7, 0x5, 0x81, 0x8001, 0x7, 0x6, 0x9, 0x4, 0xff8, 0xffffffff]}], r3, 0x1, 0x1, 0x288}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f, 0x3}}, 0x20) (async) write$midi(r6, &(0x7f00000002c0)="5c13b145d2dc5689edb1daf06982c6679055f02aad29004c28550825b31e47542855596de7500575cadde6e3f301bfd2471c3ace5ac897bb0cccc0d6d7fb22f76523535248602d1f4d2fc257cace80cb7c941b6f28", 0x55) (async) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000680)={0x6, 0x118, 0xfa00, {{0x200, 0x54, "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", 0x3, 0x1, 0x3, 0x2, 0x78, 0x0, 0x9, 0x1}, r7}}, 0x120) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r5}}, 0xc) (async) 13:25:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:04 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000180)={'gretap0\x00', 0x0, 0x10, 0x40, 0x4, 0x5, {{0x50, 0x4, 0x1, 0x7, 0x140, 0x64, 0x0, 0xe7, 0x4, 0x0, @local, @remote, {[@timestamp_prespec={0x44, 0x54, 0x5c, 0x3, 0x4, [{@dev={0xac, 0x14, 0x14, 0x1c}, 0x25f1}, {@private=0xa010101, 0x9a7b}, {@private=0xa010100, 0x9158}, {@local, 0x3}, {@rand_addr=0x64010101, 0x3ff}, {@multicast2, 0x114}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x2}, {@broadcast, 0x8000}, {@private=0xa010101, 0x4}, {@loopback, 0x20}]}, @lsrr={0x83, 0x13, 0x3a, [@rand_addr=0x64010101, @multicast2, @loopback, @private=0xa010100]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x5b, 0x3, [{0x0, 0xf, "02da9d5e4ee363cfa1047b020e"}, {0x6, 0x8, "829aa4ff8744"}, {0x2, 0xe, "8e28d2fb970515de3283a243"}, {0x5, 0xf, "d3bb2177216f000f4efa148005"}, {0x5, 0x5, "fa0640"}, {0x0, 0xf, "f866759373b47aa2d38d103ea6"}, {0x1, 0xd, "0cad8378ce268014a515a0"}]}, @cipso={0x86, 0x1a, 0x1, [{0x1, 0x5, "cb509c"}, {0x2, 0xf, "c4eb63d4aea5e67226618fcf42"}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x2e, 0x1, [{0x0, 0x3, 'j'}, {0x5, 0xd, "7feac4b0ca26078fef034a"}, {0x3, 0xa, "03b0abfc8b6275ed"}, {0x5, 0xc, "bf928c7521ed888b0d75"}, {0x5, 0x2}]}, @rr={0x7, 0x13, 0xcd, [@dev={0xac, 0x14, 0x14, 0x24}, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @private=0xa010100]}, @ra={0x94, 0x4}, @end]}}}}}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r3, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'sit0\x00', 0x0, 0x20, 0x8000, 0x4, 0x3, {{0xc, 0x4, 0x0, 0x3, 0x30, 0x68, 0x0, 0x0, 0x29, 0x0, @broadcast, @local, {[@lsrr={0x83, 0xf, 0xcf, [@loopback, @multicast1, @multicast1]}, @timestamp_prespec={0x44, 0xc, 0x29, 0x3, 0x5, [{@empty, 0x1f}]}]}}}}}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0x0, 0x3, 0x10}, 0xc) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000680)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)=ANY=[@ANYBLOB="50020000", @ANYRES16=0x0, @ANYBLOB="000029bd7000fbdbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="3401028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r1, @ANYBLOB="080007000000000040000100240001006c625f686173685f73746174730000000000000000000000000000050003000b0000000800040001000000080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c000000020000000000000005000300030000000800040024490000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000200000008000600", @ANYRES32=r3, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400effb000008000100", @ANYRES32=r4, @ANYBLOB="4400028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=r6, @ANYBLOB="ac00028038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000300000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040004000000"], 0x250}, 0x1, 0x0, 0x0, 0x200000c0}, 0x4000000) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0x69, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r7, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r8}}, 0x30) 13:25:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r4, 0xe}}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2, 0x3}, r1}}, 0x30) 13:25:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) geteuid() write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000300)={0x7, 0x8, 0xfa00, {r4, 0xe1}}, 0x10) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x0, {0xff, 0xffff0001, "80aec8007f69de605df6f1fca179c8ec05264fac54493664dd69f574687e2a514b904fc1aa2a58fcbae556f7e5b92aa27b3b5e430d47787c6014aa992d6bc872b861e13102c989d8e470a86776b95033e75349ff72fe2ddae28586d479389f3f9c97210ba031b865945761c99ba4cbe85a3208b60f0beccdebc2f62085ffc5ba254e2f1dabad9ee9bf378687ff8266d50e1a42d1d9a32526be159a3e280e855a0e7854ba8285d62cff77365a2f0958678fc3afd07d0c002885464260e38ae9eb5a766b3f68ee0ea7a946805a6a2dc31567dbcfc8891f42a08a4093cd8bbf27d06bbead8548c0c9e26031b158af9f1cae14841e7df314afec489592846483ab91", 0x40, 0x29, 0xe9, 0x40, 0x20, 0x4, 0x3}, r6}}, 0x128) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) (async) 13:25:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r2}}, 0x18) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x105800, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0x80000001, 0x5, "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", 0x3, 0x1, 0xf5, 0x1, 0x0, 0x7, 0xbf}, r1}}, 0x128) 13:25:04 executing program 5: ioctl$MEDIA_IOC_G_TOPOLOGY(0xffffffffffffffff, 0xc0487c04, &(0x7f0000000480)={0x0, 0x2, 0x0, &(0x7f0000000180)=[{}, {}], 0x4, 0x0, &(0x7f0000000240)=[{}, {}, {}, {}], 0x3, 0x0, &(0x7f0000000400)=[{}, {}, {}], 0x1, 0x0, &(0x7f00000000c0)=[{}]}) pipe2$9p(&(0x7f0000000600)={0xffffffffffffffff}, 0x4000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) mount$9p_fd(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0), 0x804804, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_mmap}, {@uname={'uname', 0x3d, ')'}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@dont_hash}, {@dont_measure}, {@subj_role={'subj_role', 0x3d, '/sys/kernel/debug/bluetooth/6lowpan_control\x00'}}]}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000080)={0x31}) ioctl$IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, &(0x7f0000000500)={@host}) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(0xffffffffffffffff, 0x7a4, &(0x7f0000000540)={{@host, 0x2}, 0x3, 0x8000000000000000, 0xfffff422, 0xffffffff}) 13:25:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:04 executing program 1: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r2, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0xd8, r0, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x4}, @ETHTOOL_A_DEBUG_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_DEBUG_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x20000015}, 0x4004800) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffb}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x7}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80000001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x136}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7610}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000801}, 0x40001) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000e40)={0x8c4, 0x0, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_DEBUG_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}, @ETHTOOL_A_DEBUG_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x30c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x3c, 0x3, 0x0, 0x1, [{0x4}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '^$\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xbb, 0x4, "1b35e4eaf059eab2946b8d8a244ae1608296b3c95fac35f3b289f738ca077db934be792abe2c3c75c544ed7a49b9df060927c4d5ccf180706d59572525887686988f016f7ce19a3e35e953a26b9e4c0ce8dc91ccb6d93a1337fb714e3c211b1f29dd5d3dd8e4dd095068afbf66ee588b37b8d87371b5184292b94bbf6fb2c4b06857f95d01a15c5ccead247a43d265b1bc2d6ac6eed0b088bbad183f4db0f08a2f217d532982569b67220a5b9b660f550f2b224e1252cd"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3ff}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xc000}, @ETHTOOL_A_BITSET_MASK={0xbf, 0x5, "7a65a0951e850344ed988e04c25b15db2c8c1cebc6dbd62cd6464ece7b902fdae343dbdd0690fde8be37b31076fc09298cf5fc30ac1e3e5b055bc27412bde8e2eb915a59575fb908e4c1e3f74aee4cff8e15adfcedd5395024a7c49ecfbde656b1a54a98248193cfd04de4c48fd514a05569d6bc96021170f4628da2a06a0eee910d6aa51178d9f8146ac6ad2f468472005a3b7d555e6981303de7a9247442cd2d794d14a7e25efca946d808b461875c1083da19ecfc43651eb612"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x44, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6bb}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0xf4, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x70000}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '{\')-\'\\\xe7%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '(+]-\xb4(%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '}}-#.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '#@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x4}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '{{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x574f}]}]}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x548, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x79, 0x5, "c9b43505506d10986ffa5639442162ce3ebde063345e8beca4683a71d52dd5552448ccf1066896d9ffdb8f5730d4c6a7bdec99369a3e08d7ac0d3359a591ef5cfae4ec78f0cfe81f68fc5bc118f7a2e5ceabcd5ffe4ae67c04c4e87847e3d3b0fd2b0b50b42cd6ecdadcc59e6eae587e889bc5c347"}, @ETHTOOL_A_BITSET_VALUE={0x95, 0x4, "c1aea2713fb8aef76ddb41f6dea6ce602aa4e77157f5bb94690cb8f3a2ce4e5850229d1d35c095bb1c2d63f6df5049d5d535d6b6834e600e6dad9c3718522f58afda39cdba2b96613f7a5750cd0785740569818fc01234f011dd190dd1e0cf33fa283bb6f30419a87f72bcd57991353e3a013eac8a9344b298093e10758198ec127d2e47c5b1869bf2b7d9b0209ae342bc"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffe}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7f}, @ETHTOOL_A_BITSET_BITS={0x150, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x655}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '/,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x81}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7535}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x0, 0x2, '//-$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe2a}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '\x00\x19\x9c\xa3\xa5\xdb%S\xcdH\xde\xe9\xd8'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x5e, 0x4, "df474e1389abb1d4a14e90a1550955de4b8fb9c800c5d6ce0efcdfe8c99bccac42fc76fa861c3d410bfa29bf2fcf52f761d1297d3426f64fa0182a6a094316a649d842b27b8b3bdaf5d29578b3d981b782bf579c9466586d852d"}, @ETHTOOL_A_BITSET_BITS={0x94, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\x1d\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_BITSET_BITS={0x120, 0x3, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '}-\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\xff\x00\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x818}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '}}-#.\x00'}]}, {0x4}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '\xc2\\\x1e.,#$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1009480}]}, {0xa4, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x77, 0x2, 'syztnl0\x00\xd3Ne\x8aBf\']4\xeb#\xa6I\x03\xfc2\b\xa7\b\xb5p\'H\x8b\xe5!\xd1\xf2\xc9\x91\x9f\xaa\xec\xf6lD\xc5\xeeOog\xfe\xaa*1\xfb\xab9\x994D\x18\x12F(`\xf3\x8d\xf3\xb0\xb1\x1d\xe0\xcd\xd0\x94\'4q\x90\x94r1\x9c \xacN3+h\xc2\xfa\xadR\xd3ro \x9d\x06\xed\"\xe4\x86\x9cm\x90\x9a\xb7|[n\xdd\xce\x16\xf8\xed'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x9c, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd43}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '/,\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfd6d}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x81}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}]}]}, @ETHTOOL_A_BITSET_MASK={0x1e, 0x5, "dc1125782c0f179c92638e727208e6fbcecf4c599096270f895a"}]}]}, 0x8c4}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r9, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, &(0x7f0000000640)={'syztnl0\x00', &(0x7f00000005c0)={'erspan0\x00', 0x0, 0x7, 0x40, 0xffffffcc, 0x379, {{0xf, 0x4, 0x2, 0x1f, 0x3c, 0x64, 0x0, 0x40, 0x29, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x28}, {[@timestamp={0x44, 0x18, 0xd8, 0x0, 0x8, [0x7, 0x6, 0x9784, 0xc1e, 0x2]}, @end, @noop, @generic={0x94, 0xc, "e084542313f958aeed41"}]}}}}}) sendmsg$ETHTOOL_MSG_WOL_SET(r6, &(0x7f00000008c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000880)={&(0x7f0000000680)={0x1c8, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@ETHTOOL_A_WOL_SOPASS={0xa8, 0x3, "52ef10397e298d218ab1dd776a818b39f36aba51788d853e5ccfd2462702e0d508f584ad1707677af2ffb26574f0dc083b144dbc5ab98b41c20f6711306327c945b3dde67bcec8655e7805b01407ad0e25cdce912048e7c6252575592e50185447776368d4b213f65660eba0d3d37e47f7b7a18bc9137ee5dab3a810b88716066d9777dd8dfb0f4b6ae19e4f2be03d8f01238d0e1a93b304a8547b46d13cef31e6737a33"}, @ETHTOOL_A_WOL_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_WOL_SOPASS={0x4d, 0x3, "ba2d7318017f3c7413045523bd1f1fa8acc34545cb9c4ba520900fc31fd4c3e69fabcb4bcc8d4fa2e5d3b843f3597d6ff835f39065c21c5dfb2fad4418ba80f7b4bfa6a513cb522df5"}, @ETHTOOL_A_WOL_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @ETHTOOL_A_WOL_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_WOL_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x1}, 0x4004044) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r7, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r7}}, 0x10) 13:25:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) geteuid() (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000300)={0x7, 0x8, 0xfa00, {r4, 0xe1}}, 0x10) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x0, {0xff, 0xffff0001, "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", 0x40, 0x29, 0xe9, 0x40, 0x20, 0x4, 0x3}, r6}}, 0x128) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000007c0)='pwc_handler_enter\x00'}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x10, 0x0, [0xc09, 0x40, 0x7, 0x9, 0xffff, 0x6de0, 0x8, 0x3, 0xfffffffa, 0xf58, 0x7fff, 0x101, 0x9, 0x8, 0x2, 0x3]}, {0x8, 0x0, [0xdd, 0x4, 0x0, 0x1, 0x10001, 0x6, 0x1, 0x7fffffff, 0x5, 0x4, 0x9, 0x6, 0x3ff, 0xfff, 0x2ac, 0x10001]}, {0x2, 0x0, [0xc412, 0x9, 0x0, 0x3, 0x952c, 0x8, 0x9c, 0x2, 0x7fff, 0x1, 0x9, 0x8, 0x4, 0x1000, 0x8, 0x2]}, {0x0, 0x0, [0x8, 0x4, 0xfff, 0x6, 0x8000, 0x80000000, 0x2, 0xffff, 0x9, 0x4, 0x0, 0x2, 0x80, 0x7, 0x6, 0x7]}, {0x0, 0x0, [0x7b1, 0x5, 0x40, 0x200, 0x572, 0x2, 0xfffffffd, 0x3, 0x8, 0x1, 0x6, 0x7, 0x5, 0x80d6, 0x9b, 0x5]}, {0x5, 0x0, [0x8, 0x9c3, 0xb4a9, 0xfffffff7, 0x2, 0x5, 0xfffffff8, 0x1, 0x401, 0x7, 0x47, 0x1, 0xa9b, 0x3, 0x3, 0x7]}, {0x0, 0x0, [0x5, 0x59, 0x400, 0x0, 0x9, 0xffff, 0x80, 0x180, 0x2, 0x8, 0xffff, 0xbbb, 0x9, 0x4, 0x26, 0xffff]}, {0x0, 0x0, [0x2, 0x6, 0x8000, 0x41, 0x0, 0x5, 0xfff, 0x3, 0x7, 0x7ff, 0x81, 0x2, 0x5, 0x5, 0x3, 0x101]}, {0x0, 0x0, [0x0, 0x10001, 0x9, 0x8, 0x1, 0x7, 0x5, 0x81, 0x8001, 0x7, 0x6, 0x9, 0x4, 0xff8, 0xffffffff]}], r3, 0x1, 0x1, 0x288}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$midi(r6, &(0x7f00000002c0)="5c13b145d2dc5689edb1daf06982c6679055f02aad29004c28550825b31e47542855596de7500575cadde6e3f301bfd2471c3ace5ac897bb0cccc0d6d7fb22f76523535248602d1f4d2fc257cace80cb7c941b6f28", 0x55) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000680)={0x6, 0x118, 0xfa00, {{0x200, 0x54, "065f261a51ff2443917cf2d0f4d57717c6174864ca690bd3c2db0e223f47cfc5400a4acd7d7e769aa1f00de68b6ce639283cafae3a38a8c1272d51bcddd0a5ecb854014579ef62f16042c5bfe490f54e597121c250ec8c0744e16e8b249b79666d5a91139de2dc9935a8964431a1ed03e6d69a06f4b1d7af9c7cc92f765c630d459710c5f382afe9c861b0883601e130e242df417e2f68394b79d5a76fcf8e5d845fae824031b7ca3ce6d95c931070c4c72dcaf4bd3d1fe2b997b2347977e8966c5e30ae271122d539c8f6b1bae4c2282a23765b21ae4699fd96e238c069f08d5eca2d2699806a04daed3fa8893f0b6f56f43734b2b4acb6619ca277e022ea37", 0x3, 0x1, 0x3, 0x2, 0x78, 0x0, 0x9, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r5}}, 0xc) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000007c0)='pwc_handler_enter\x00'}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x10, 0x0, [0xc09, 0x40, 0x7, 0x9, 0xffff, 0x6de0, 0x8, 0x3, 0xfffffffa, 0xf58, 0x7fff, 0x101, 0x9, 0x8, 0x2, 0x3]}, {0x8, 0x0, [0xdd, 0x4, 0x0, 0x1, 0x10001, 0x6, 0x1, 0x7fffffff, 0x5, 0x4, 0x9, 0x6, 0x3ff, 0xfff, 0x2ac, 0x10001]}, {0x2, 0x0, [0xc412, 0x9, 0x0, 0x3, 0x952c, 0x8, 0x9c, 0x2, 0x7fff, 0x1, 0x9, 0x8, 0x4, 0x1000, 0x8, 0x2]}, {0x0, 0x0, [0x8, 0x4, 0xfff, 0x6, 0x8000, 0x80000000, 0x2, 0xffff, 0x9, 0x4, 0x0, 0x2, 0x80, 0x7, 0x6, 0x7]}, {0x0, 0x0, [0x7b1, 0x5, 0x40, 0x200, 0x572, 0x2, 0xfffffffd, 0x3, 0x8, 0x1, 0x6, 0x7, 0x5, 0x80d6, 0x9b, 0x5]}, {0x5, 0x0, [0x8, 0x9c3, 0xb4a9, 0xfffffff7, 0x2, 0x5, 0xfffffff8, 0x1, 0x401, 0x7, 0x47, 0x1, 0xa9b, 0x3, 0x3, 0x7]}, {0x0, 0x0, [0x5, 0x59, 0x400, 0x0, 0x9, 0xffff, 0x80, 0x180, 0x2, 0x8, 0xffff, 0xbbb, 0x9, 0x4, 0x26, 0xffff]}, {0x0, 0x0, [0x2, 0x6, 0x8000, 0x41, 0x0, 0x5, 0xfff, 0x3, 0x7, 0x7ff, 0x81, 0x2, 0x5, 0x5, 0x3, 0x101]}, {0x0, 0x0, [0x0, 0x10001, 0x9, 0x8, 0x1, 0x7, 0x5, 0x81, 0x8001, 0x7, 0x6, 0x9, 0x4, 0xff8, 0xffffffff]}], r3, 0x1, 0x1, 0x288}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x13f, 0x3}}, 0x20) (async) write$midi(r6, &(0x7f00000002c0)="5c13b145d2dc5689edb1daf06982c6679055f02aad29004c28550825b31e47542855596de7500575cadde6e3f301bfd2471c3ace5ac897bb0cccc0d6d7fb22f76523535248602d1f4d2fc257cace80cb7c941b6f28", 0x55) (async) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000680)={0x6, 0x118, 0xfa00, {{0x200, 0x54, "065f261a51ff2443917cf2d0f4d57717c6174864ca690bd3c2db0e223f47cfc5400a4acd7d7e769aa1f00de68b6ce639283cafae3a38a8c1272d51bcddd0a5ecb854014579ef62f16042c5bfe490f54e597121c250ec8c0744e16e8b249b79666d5a91139de2dc9935a8964431a1ed03e6d69a06f4b1d7af9c7cc92f765c630d459710c5f382afe9c861b0883601e130e242df417e2f68394b79d5a76fcf8e5d845fae824031b7ca3ce6d95c931070c4c72dcaf4bd3d1fe2b997b2347977e8966c5e30ae271122d539c8f6b1bae4c2282a23765b21ae4699fd96e238c069f08d5eca2d2699806a04daed3fa8893f0b6f56f43734b2b4acb6619ca277e022ea37", 0x3, 0x1, 0x3, 0x2, 0x78, 0x0, 0x9, 0x1}, r7}}, 0x120) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r5}}, 0xc) (async) 13:25:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x40a000, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r2, 0x7ab, &(0x7f00000000c0)={&(0x7f0000000180)={{@my=0x0, 0x3}, {@any, 0x100}, 0x400, "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"}, 0x418, 0x5a}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) ioctl$IOCTL_VMCI_SET_NOTIFY(r2, 0x7cb, &(0x7f00000005c0)={0x2, 0x2, 0x92}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000640)={0x8, 0x120, 0xfa00, {0x4, {0x81, 0x3, "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", 0x8, 0x8, 0xd1, 0xf9, 0x3, 0x3, 0x3}, r5}}, 0x128) 13:25:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x9, 0x0}, 0x8) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(r3, 0xc1007c01, &(0x7f0000000180)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r2}, 0x4) 13:25:04 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r0}}, 0x30) 13:25:04 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r0}}, 0x30) 13:25:04 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r0}}, 0x30) 13:25:04 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x85}, 0x8) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x0, 0x80, "69f72734626357aeeb40bb2f1f62d2bba349117bce14deb41f4daf8964dd7544f45a55340b316a02b7ce273b1300d7a3b1ec0754511d496dfd4cc6ec996799abb6d9f7269993a8d07c3f73f62fb0ea28eb227347a86517e11a15f3ae7a2b6b451120947990d74ca3a6053e306971b8010e9a760f957b09834e5a19435e4dbbfbd0f8d18ee783f996e8df97803366d1b805ff4b6d9cd4a6045da33679a57993a816a3766c68c0ae395ff6b860ea17944c388cf2220a58a6e9273eb12b8e3abf4b2929d4d69962735d6ad8213c6d1e15dd7f9df59cc37b88fc03ea8f7250bd77d81ced15fc4c0506594cac813bc8c89e400fd1e5fa24ec8ba760f165e2d2a18be4", 0x1, 0x7, 0x5, 0x20, 0x0, 0x8, 0x9, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, '\x00', 0x1f}, 0xfffffff8}, r4}}, 0x30) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r5, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r6, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYBLOB='\x00', @ANYRES16=r6, @ANYBLOB="20002dbd7000fedbdf250900000008000600d70900006c00018008000b007369700008000500010000000800050002000000060001000a000000080006006f766600060002002f00000008000b007369700014000300fc01000000000000000000000000000014000300e0000001000000000000000000000000080008000100000030000280060002004e200000140001002001000000000000000000000000000106000f000000000008000400008000000800060004000000080006007f00000008000600ffffffff0800050006000000"], 0xd8}, 0x1, 0x0, 0x0, 0x8011}, 0x4040) 13:25:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000440)={0x8, 0x120, 0xfa00, {0x0, {0x24be, 0xd0, "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", 0x0, 0x3, 0x7, 0x4d, 0xff, 0x7, 0x81, 0x1}, r1}}, 0x128) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0xffffffffffffffff, 0xe122, 0x18}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x1, &(0x7f0000000100)=@raw=[@exit], &(0x7f0000000140)='syzkaller\x00', 0x5673, 0x66, &(0x7f0000000180)=""/102, 0x0, 0x14, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000200)={0x6, 0x3f}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x8, 0xec, 0x8}, 0x10, 0x12f3, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1, r3]}, 0x80) 13:25:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x40a000, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r2, 0x7ab, &(0x7f00000000c0)={&(0x7f0000000180)={{@my=0x0, 0x3}, {@any, 0x100}, 0x400, "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"}, 0x418, 0x5a}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) ioctl$IOCTL_VMCI_SET_NOTIFY(r2, 0x7cb, &(0x7f00000005c0)={0x2, 0x2, 0x92}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000640)={0x8, 0x120, 0xfa00, {0x4, {0x81, 0x3, "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", 0x8, 0x8, 0xd1, 0xf9, 0x3, 0x3, 0x3}, r5}}, 0x128) 13:25:04 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x85}, 0x8) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) geteuid() (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000300)={0x7, 0x8, 0xfa00, {r4, 0xe1}}, 0x10) (async) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x0, {0xff, 0xffff0001, "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", 0x40, 0x29, 0xe9, 0x40, 0x20, 0x4, 0x3}, r6}}, 0x128) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (rerun: 64) 13:25:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r2, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5d3}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xd29}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 13:25:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000140)=0x23fe) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 2: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x85}, 0x8) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x40a000, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r2, 0x7ab, &(0x7f00000000c0)={&(0x7f0000000180)={{@my=0x0, 0x3}, {@any, 0x100}, 0x400, "29eca3cbd146dde745094a2bb0f0d8c23360725136942dfba3119a4d9fa355e37114f643aacb270dff2ba1cbca462d62859c616563a1e6a04913771c3a507d8c1bc17f478d4be2f1ca833bd46f04d7078ed2094b12b20202ff8f8c6a7bcdbdb239f9a15a008c88969a45d18dc7280814a709bbf144079661b2dfb3fc738360d050b0a370eaf4ea9fdfebc63d026b3bb93f62c02b9a1f384fead938b533699bca1d1853d2c22733db843d00873f07cf9256fd415bd1aeff4bc262490d7a220791dfa4d241173398ecf94a5d529e76620eaa1346f9438b6b328c115b4798762e637ab263e552ba9a2d969f653d4bdf2a52c748cff29da0365bc8012090c9048dca256c24473141aeb4df34c87e39bf584452167ef5a6f870ff6f25bb06c2aa62a526e43490e80ea3238f7c7eb45cf4e11f80795c40fb8150b4b51cadaea485b5c889b679cad0baa1573ff502f0268a873653afa4adf677621928b16cf6b5ea5c22f45b2b70a19ea6316846fefb0f070e61e897160e86e7326935c6b3e46050b3a957c4f06c43e31113a114b6b4951d88bae07ada3e4ea7deeadfd2f19fe6cb8147bcfbaa9242a279ab9c7b11084e7c28aab3a22c6469ee7c86c2fbb7e5d034a2faaab6369b0a41a4bd711cfac47df891faf878a0eb10667f39055074fd0f07b7dddc1f6904fe37b80f2c1670dc0ca5e9d27df18ca08f7984e4792cf19e8243548f59e8468e4b9e944fb51d69ff2cd38946b4f51cb5bfeb98532df2780fa48a82752bab7b9697e3354b0b6fe7329d5834acff925d08b9c5ab959ca47cea24a22d05b6787be98d4489616c611096907f21e4a4495069d0f7863566492393961107b122f67b75f4d35ea82372dd1ce68eac908266ad6104cf99494302939d9f65ea7f76dedac0d9adf43194d7917e2b8eb23946b82a540e29835a271931f10512aaa47c60c167893199a96d1ba760a3bed31019c646bc4445a4793b28e58dd50b2e61a355fd2cf1f28517cc93887e0dd949490466a87aa3a0a2569c25186e48dec9e1aa9be88adffa065e24cc8d77694bc1f6409d4b04243786a2e865cba446a76f07ebd0c34fc7c354092279b430a551d6ab8c9a44183d4be957b1fe2be321346569eb873633e958d7919e8b44168506992c8972a4be220215c25c66b67fa9ccbcaf5e6377b0c253f2423502e2c7c94ef5f44e866b1989c4a052628df1d99b1d494650c99082ab7fac66692ec85c53ef565ac7a1ec216e64d3cdcede789fc64933d374b6f79670a8f328c6c1b7f09280856bf8d31fd6422962aa4d41853604e1563befc083fa0eaf80c24f290a587b8c48fd53200eb8deec4ac15bda115c4a00e0c76c4536e85bea760cbf3923f594e36d17f8ba648314245bbadd8078e9cec183a10ef4d3ec5eb4b3446b53d9ad8cd099a95c85da3732bee4e631156b7443ea927e"}, 0x418, 0x5a}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) ioctl$IOCTL_VMCI_SET_NOTIFY(r2, 0x7cb, &(0x7f00000005c0)={0x2, 0x2, 0x92}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000640)={0x8, 0x120, 0xfa00, {0x4, {0x81, 0x3, "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", 0x8, 0x8, 0xd1, 0xf9, 0x3, 0x3, 0x3}, r5}}, 0x128) 13:25:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000300)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r2, r3}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r4}}, 0x30) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380), r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000500)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000580)={0x15, 0x110, 0xfa00, {r6, 0x7, 0x0, 0x0, 0x0, @ib={0x1b, 0x1000, 0xffffffff, {"fb148c258adb35dc2acb9dc2a8312a97"}, 0x100, 0x6, 0x5}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2b}}}}, 0x118) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xbc, r5, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x32}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x36}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xb40}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2e}, @IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x8001}, 0x4048040) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000800), 0xc, &(0x7f0000000a80)={&(0x7f0000000940)=ANY=[@ANYBLOB="18010000", @ANYRES16=0x0, @ANYBLOB="020027bd7000fbdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="b800028038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400001000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="406575655f6964000000000000000000edffffff00000000000000000000000500030003000000080004000300000008000600"/60, @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400a1000000"], 0x118}, 0x1, 0x0, 0x0, 0x4000011}, 0x4051) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f00000006c0)={0x8, 0x120, 0xfa00, {0x2, {0x9, 0x2, "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", 0x7f, 0x67, 0x0, 0x2, 0xa2, 0x9, 0x80, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r4, 0xfffffffe, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @private=0xa010100}, @ib={0x1b, 0x4, 0x1, {"9e6b11b1827af93d9534875f1c22af9b"}, 0x4216bf3c, 0xfff, 0x6}}}, 0x118) 13:25:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @remote, 0xdb82}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) socketpair(0x27, 0x2, 0x69, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01002abd7000ffdbdf2500000000000c00050009000000000000002c00078008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="1c000a002f6465762f696e66696e6962616e642f72646d615f636d0005000a0000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x14) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x101, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x1, {"61bc2a3bc63e8a464f83a7c52d764009"}, 0xfffffffffffffff8, 0xbd4, 0x1f}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3f}}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r2, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5d3}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xd29}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r3, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 13:25:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000140)=0x23fe) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x2, @mcast2, 0x3}, r1}}, 0x6b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x8, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e20, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x191}}}, 0x118) 13:25:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r2, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5d3}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xd29}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r3, 0x0, 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 13:25:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000140)=0x23fe) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x40a000, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r2, 0x7ab, &(0x7f00000000c0)={&(0x7f0000000180)={{@my=0x0, 0x3}, {@any, 0x100}, 0x400, "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"}, 0x418, 0x5a}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) ioctl$IOCTL_VMCI_SET_NOTIFY(r2, 0x7cb, &(0x7f00000005c0)={0x2, 0x2, 0x92}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) 13:25:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @remote, 0xdb82}, r1}}, 0x30) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) socketpair(0x27, 0x2, 0x69, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) (async) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, 0x0) (async) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01002abd7000ffdbdf2500000000000c00050009000000000000002c00078008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="1c000a002f6465762f696e66696e6962616e642f72646d615f636d0005000a0000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x14) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x101, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x1, {"61bc2a3bc63e8a464f83a7c52d764009"}, 0xfffffffffffffff8, 0xbd4, 0x1f}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3f}}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x3f}}, 0x10) 13:25:04 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r5 = syz_open_dev$ndb(&(0x7f0000000280), 0x0, 0xae242) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r6) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440), 0x900, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0), r4) sendmsg$IPVS_CMD_FLUSH(r7, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x5c, r8, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xfe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000804}, 0x20044001) 13:25:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x2, @mcast2, 0x3}, r1}}, 0x6b) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x8, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e20, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x191}}}, 0x118) 13:25:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r9, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) r11 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r11, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r12, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000001000)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x632cea857240752}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000600)={0x998, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{{0x8}, {0x208, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0xfff7, 0x7f, 0x3, 0xe1a4}, {0x0, 0x81, 0x3}, {0x100, 0x9c, 0x5, 0x5}, {0x4, 0x81, 0x7, 0x5}, {0x101, 0x2, 0xca, 0x3}, {0x9, 0x9, 0x3f, 0xffff075b}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x24c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}]}}]}, 0x998}, 0x1, 0x0, 0x0, 0x4}, 0x40004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x40a000, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r2, 0x7ab, &(0x7f00000000c0)={&(0x7f0000000180)={{@my=0x0, 0x3}, {@any, 0x100}, 0x400, "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"}, 0x418, 0x5a}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) ioctl$IOCTL_VMCI_SET_NOTIFY(r2, 0x7cb, &(0x7f00000005c0)={0x2, 0x2, 0x92}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) 13:25:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r9, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) r11 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r11, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r12, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000001000)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x632cea857240752}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000600)={0x998, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{{0x8}, {0x208, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0xfff7, 0x7f, 0x3, 0xe1a4}, {0x0, 0x81, 0x3}, {0x100, 0x9c, 0x5, 0x5}, {0x4, 0x81, 0x7, 0x5}, {0x101, 0x2, 0xca, 0x3}, {0x9, 0x9, 0x3f, 0xffff075b}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x24c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}]}}]}, 0x998}, 0x1, 0x0, 0x0, 0x4}, 0x40004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x2, @mcast2, 0x3}, r1}}, 0x6b) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x8, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e20, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x191}}}, 0x118) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x2, @mcast2, 0x3}, r1}}, 0x6b) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x8, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e20, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}, 0x191}}}, 0x118) (async) 13:25:04 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:04 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r9, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) r11 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r11, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r12, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000001000)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x632cea857240752}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000600)={0x998, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{{0x8}, {0x208, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0xfff7, 0x7f, 0x3, 0xe1a4}, {0x0, 0x81, 0x3}, {0x100, 0x9c, 0x5, 0x5}, {0x4, 0x81, 0x7, 0x5}, {0x101, 0x2, 0xca, 0x3}, {0x9, 0x9, 0x3f, 0xffff075b}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x24c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}]}}]}, 0x998}, 0x1, 0x0, 0x0, 0x4}, 0x40004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r2, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @remote, 0xdb82}, r1}}, 0x30) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) socketpair(0x27, 0x2, 0x69, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) (async) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01002abd7000ffdbdf2500000000000c00050009000000000000002c00078008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="1c000a002f6465762f696e66696e6962616e642f72646d615f636d0005000a0000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x14) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x101, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x1, {"61bc2a3bc63e8a464f83a7c52d764009"}, 0xfffffffffffffff8, 0xbd4, 0x1f}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3f}}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r5 = syz_open_dev$ndb(&(0x7f0000000280), 0x0, 0xae242) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r6) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440), 0x900, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0), r4) sendmsg$IPVS_CMD_FLUSH(r7, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x5c, r8, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xfe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000804}, 0x20044001) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r9, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) r11 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r11, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r12, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000001000)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x632cea857240752}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000600)={0x998, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{{0x8}, {0x208, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0xfff7, 0x7f, 0x3, 0xe1a4}, {0x0, 0x81, 0x3}, {0x100, 0x9c, 0x5, 0x5}, {0x4, 0x81, 0x7, 0x5}, {0x101, 0x2, 0xca, 0x3}, {0x9, 0x9, 0x3f, 0xffff075b}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x24c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}]}}]}, 0x998}, 0x1, 0x0, 0x0, 0x4}, 0x40004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r2, 0x0, 0x2, 0x4}}, 0x20) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x40a000, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r2, 0x7ab, &(0x7f00000000c0)={&(0x7f0000000180)={{@my=0x0, 0x3}, {@any, 0x100}, 0x400, "29eca3cbd146dde745094a2bb0f0d8c23360725136942dfba3119a4d9fa355e37114f643aacb270dff2ba1cbca462d62859c616563a1e6a04913771c3a507d8c1bc17f478d4be2f1ca833bd46f04d7078ed2094b12b20202ff8f8c6a7bcdbdb239f9a15a008c88969a45d18dc7280814a709bbf144079661b2dfb3fc738360d050b0a370eaf4ea9fdfebc63d026b3bb93f62c02b9a1f384fead938b533699bca1d1853d2c22733db843d00873f07cf9256fd415bd1aeff4bc262490d7a220791dfa4d241173398ecf94a5d529e76620eaa1346f9438b6b328c115b4798762e637ab263e552ba9a2d969f653d4bdf2a52c748cff29da0365bc8012090c9048dca256c24473141aeb4df34c87e39bf584452167ef5a6f870ff6f25bb06c2aa62a526e43490e80ea3238f7c7eb45cf4e11f80795c40fb8150b4b51cadaea485b5c889b679cad0baa1573ff502f0268a873653afa4adf677621928b16cf6b5ea5c22f45b2b70a19ea6316846fefb0f070e61e897160e86e7326935c6b3e46050b3a957c4f06c43e31113a114b6b4951d88bae07ada3e4ea7deeadfd2f19fe6cb8147bcfbaa9242a279ab9c7b11084e7c28aab3a22c6469ee7c86c2fbb7e5d034a2faaab6369b0a41a4bd711cfac47df891faf878a0eb10667f39055074fd0f07b7dddc1f6904fe37b80f2c1670dc0ca5e9d27df18ca08f7984e4792cf19e8243548f59e8468e4b9e944fb51d69ff2cd38946b4f51cb5bfeb98532df2780fa48a82752bab7b9697e3354b0b6fe7329d5834acff925d08b9c5ab959ca47cea24a22d05b6787be98d4489616c611096907f21e4a4495069d0f7863566492393961107b122f67b75f4d35ea82372dd1ce68eac908266ad6104cf99494302939d9f65ea7f76dedac0d9adf43194d7917e2b8eb23946b82a540e29835a271931f10512aaa47c60c167893199a96d1ba760a3bed31019c646bc4445a4793b28e58dd50b2e61a355fd2cf1f28517cc93887e0dd949490466a87aa3a0a2569c25186e48dec9e1aa9be88adffa065e24cc8d77694bc1f6409d4b04243786a2e865cba446a76f07ebd0c34fc7c354092279b430a551d6ab8c9a44183d4be957b1fe2be321346569eb873633e958d7919e8b44168506992c8972a4be220215c25c66b67fa9ccbcaf5e6377b0c253f2423502e2c7c94ef5f44e866b1989c4a052628df1d99b1d494650c99082ab7fac66692ec85c53ef565ac7a1ec216e64d3cdcede789fc64933d374b6f79670a8f328c6c1b7f09280856bf8d31fd6422962aa4d41853604e1563befc083fa0eaf80c24f290a587b8c48fd53200eb8deec4ac15bda115c4a00e0c76c4536e85bea760cbf3923f594e36d17f8ba648314245bbadd8078e9cec183a10ef4d3ec5eb4b3446b53d9ad8cd099a95c85da3732bee4e631156b7443ea927e"}, 0x418, 0x5a}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) ioctl$IOCTL_VMCI_SET_NOTIFY(r2, 0x7cb, &(0x7f00000005c0)={0x2, 0x2, 0x92}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 13:25:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r2, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r2, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r8, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) r10 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r10, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r11, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000001000)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x632cea857240752}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000600)={0x998, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{{0x8}, {0x208, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0xfff7, 0x7f, 0x3, 0xe1a4}, {0x0, 0x81, 0x3}, {0x100, 0x9c, 0x5, 0x5}, {0x4, 0x81, 0x7, 0x5}, {0x101, 0x2, 0xca, 0x3}, {0x9, 0x9, 0x3f, 0xffff075b}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x24c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}]}}]}, 0x998}, 0x1, 0x0, 0x0, 0x4}, 0x40004) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r2, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000005c0)) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r9, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r5 = syz_open_dev$ndb(&(0x7f0000000280), 0x0, 0xae242) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r6) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440), 0x900, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0), r4) sendmsg$IPVS_CMD_FLUSH(r7, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x5c, r8, 0x400, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x401}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xfe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000804}, 0x20044001) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x40a000, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r2, 0x7ab, &(0x7f00000000c0)={&(0x7f0000000180)={{@my=0x0, 0x3}, {@any, 0x100}, 0x400, "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"}, 0x418, 0x5a}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) ioctl$IOCTL_VMCI_SET_NOTIFY(r2, 0x7cb, &(0x7f00000005c0)={0x2, 0x2, 0x92}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000005c0)) socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) 13:25:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r0}}, 0x30) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) socketpair(0x9, 0x4, 0x359, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x7800, 0x41, 0x343, 0x3ff, {{0x3a, 0x4, 0x2, 0x7, 0xe8, 0x66, 0x0, 0xb9, 0x2f, 0x0, @broadcast, @multicast2, {[@timestamp_prespec={0x44, 0x2c, 0x2d, 0x3, 0x9, [{@loopback, 0x4}, {@empty, 0x800}, {@private=0xa010102, 0x20}, {@empty, 0x29}, {@multicast2, 0x3}]}, @cipso={0x86, 0x48, 0x3, [{0x7, 0x9, "27c35cb38ccfeb"}, {0x1, 0x3, ' '}, {0x6, 0x11, "adbe12ced094b6cc6b7ac933e30bf7"}, {0x1, 0xd, "56d26e068f37a99c5b28eb"}, {0x2, 0x8, "e615df59a4cf"}, {0x7, 0x6, "6843a64c"}, {0x1, 0x2}, {0x7, 0x8, "856ca4fa4a22"}]}, @timestamp_addr={0x44, 0x3c, 0xc6, 0x1, 0xc, [{@private=0xa010102, 0x9}, {@private=0xa010101, 0xe97f}, {@remote, 0xfffffffd}, {@dev={0xac, 0x14, 0x14, 0x12}, 0x2383}, {@private=0xa010102, 0xffffffe0}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@private=0xa010100, 0xfff}]}, @ssrr={0x89, 0xf, 0xe1, [@multicast2, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @lsrr={0x83, 0x13, 0xb9, [@broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @rand_addr=0x64010101, @multicast2]}, @end]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=@RTM_NEWMDB={0x78, 0x54, 0x20, 0x70bd2d, 0x25dfdbfe, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x2, 0x1, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x1, 0x2, 0x0, {@in6_addr=@ipv4={'\x00', '\xff\xff', @loopback}, 0x8edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x3, 0x1, {@in6_addr=@dev={0xfe, 0x80, '\x00', 0x19}, 0x800}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000080) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 13:25:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r0}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x40a000, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r2, 0x7ab, &(0x7f00000000c0)={&(0x7f0000000180)={{@my=0x0, 0x3}, {@any, 0x100}, 0x400, "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"}, 0x418, 0x5a}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) ioctl$IOCTL_VMCI_SET_NOTIFY(r2, 0x7cb, &(0x7f00000005c0)={0x2, 0x2, 0x92}) 13:25:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r0}}, 0x30) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) socketpair(0x9, 0x4, 0x359, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x7800, 0x41, 0x343, 0x3ff, {{0x3a, 0x4, 0x2, 0x7, 0xe8, 0x66, 0x0, 0xb9, 0x2f, 0x0, @broadcast, @multicast2, {[@timestamp_prespec={0x44, 0x2c, 0x2d, 0x3, 0x9, [{@loopback, 0x4}, {@empty, 0x800}, {@private=0xa010102, 0x20}, {@empty, 0x29}, {@multicast2, 0x3}]}, @cipso={0x86, 0x48, 0x3, [{0x7, 0x9, "27c35cb38ccfeb"}, {0x1, 0x3, ' '}, {0x6, 0x11, "adbe12ced094b6cc6b7ac933e30bf7"}, {0x1, 0xd, "56d26e068f37a99c5b28eb"}, {0x2, 0x8, "e615df59a4cf"}, {0x7, 0x6, "6843a64c"}, {0x1, 0x2}, {0x7, 0x8, "856ca4fa4a22"}]}, @timestamp_addr={0x44, 0x3c, 0xc6, 0x1, 0xc, [{@private=0xa010102, 0x9}, {@private=0xa010101, 0xe97f}, {@remote, 0xfffffffd}, {@dev={0xac, 0x14, 0x14, 0x12}, 0x2383}, {@private=0xa010102, 0xffffffe0}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@private=0xa010100, 0xfff}]}, @ssrr={0x89, 0xf, 0xe1, [@multicast2, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @lsrr={0x83, 0x13, 0xb9, [@broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @rand_addr=0x64010101, @multicast2]}, @end]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=@RTM_NEWMDB={0x78, 0x54, 0x20, 0x70bd2d, 0x25dfdbfe, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x2, 0x1, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x1, 0x2, 0x0, {@in6_addr=@ipv4={'\x00', '\xff\xff', @loopback}, 0x8edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x3, 0x1, {@in6_addr=@dev={0xfe, 0x80, '\x00', 0x19}, 0x800}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000080) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 13:25:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r0}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000005c0)) socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r5 = syz_open_dev$ndb(&(0x7f0000000280), 0x0, 0xae242) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r6) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440), 0x900, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0), r4) 13:25:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r0}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 13:25:05 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r0}}, 0x30) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) socketpair(0x9, 0x4, 0x359, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x7800, 0x41, 0x343, 0x3ff, {{0x3a, 0x4, 0x2, 0x7, 0xe8, 0x66, 0x0, 0xb9, 0x2f, 0x0, @broadcast, @multicast2, {[@timestamp_prespec={0x44, 0x2c, 0x2d, 0x3, 0x9, [{@loopback, 0x4}, {@empty, 0x800}, {@private=0xa010102, 0x20}, {@empty, 0x29}, {@multicast2, 0x3}]}, @cipso={0x86, 0x48, 0x3, [{0x7, 0x9, "27c35cb38ccfeb"}, {0x1, 0x3, ' '}, {0x6, 0x11, "adbe12ced094b6cc6b7ac933e30bf7"}, {0x1, 0xd, "56d26e068f37a99c5b28eb"}, {0x2, 0x8, "e615df59a4cf"}, {0x7, 0x6, "6843a64c"}, {0x1, 0x2}, {0x7, 0x8, "856ca4fa4a22"}]}, @timestamp_addr={0x44, 0x3c, 0xc6, 0x1, 0xc, [{@private=0xa010102, 0x9}, {@private=0xa010101, 0xe97f}, {@remote, 0xfffffffd}, {@dev={0xac, 0x14, 0x14, 0x12}, 0x2383}, {@private=0xa010102, 0xffffffe0}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@private=0xa010100, 0xfff}]}, @ssrr={0x89, 0xf, 0xe1, [@multicast2, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @lsrr={0x83, 0x13, 0xb9, [@broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @rand_addr=0x64010101, @multicast2]}, @end]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=@RTM_NEWMDB={0x78, 0x54, 0x20, 0x70bd2d, 0x25dfdbfe, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x2, 0x1, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x1, 0x2, 0x0, {@in6_addr=@ipv4={'\x00', '\xff\xff', @loopback}, 0x8edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x3, 0x1, {@in6_addr=@dev={0xfe, 0x80, '\x00', 0x19}, 0x800}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000080) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r0}}, 0x30) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) socketpair(0x9, 0x4, 0x359, &(0x7f0000000180)) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000340)={'gre0\x00', &(0x7f0000000200)={'gretap0\x00', 0x0, 0x7800, 0x41, 0x343, 0x3ff, {{0x3a, 0x4, 0x2, 0x7, 0xe8, 0x66, 0x0, 0xb9, 0x2f, 0x0, @broadcast, @multicast2, {[@timestamp_prespec={0x44, 0x2c, 0x2d, 0x3, 0x9, [{@loopback, 0x4}, {@empty, 0x800}, {@private=0xa010102, 0x20}, {@empty, 0x29}, {@multicast2, 0x3}]}, @cipso={0x86, 0x48, 0x3, [{0x7, 0x9, "27c35cb38ccfeb"}, {0x1, 0x3, ' '}, {0x6, 0x11, "adbe12ced094b6cc6b7ac933e30bf7"}, {0x1, 0xd, "56d26e068f37a99c5b28eb"}, {0x2, 0x8, "e615df59a4cf"}, {0x7, 0x6, "6843a64c"}, {0x1, 0x2}, {0x7, 0x8, "856ca4fa4a22"}]}, @timestamp_addr={0x44, 0x3c, 0xc6, 0x1, 0xc, [{@private=0xa010102, 0x9}, {@private=0xa010101, 0xe97f}, {@remote, 0xfffffffd}, {@dev={0xac, 0x14, 0x14, 0x12}, 0x2383}, {@private=0xa010102, 0xffffffe0}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@private=0xa010100, 0xfff}]}, @ssrr={0x89, 0xf, 0xe1, [@multicast2, @dev={0xac, 0x14, 0x14, 0x1e}, @local]}, @lsrr={0x83, 0x13, 0xb9, [@broadcast, @dev={0xac, 0x14, 0x14, 0xc}, @rand_addr=0x64010101, @multicast2]}, @end]}}}}}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) sendmsg$nl_route(r2, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=@RTM_NEWMDB={0x78, 0x54, 0x20, 0x70bd2d, 0x25dfdbfe, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x2, 0x1, {@in6_addr=@loopback, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x1, 0x2, 0x0, {@in6_addr=@ipv4={'\x00', '\xff\xff', @loopback}, 0x8edd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {0x0, 0x1, 0x3, 0x1, {@in6_addr=@dev={0xfe, 0x80, '\x00', 0x19}, 0x800}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000040}, 0x20000080) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) (async) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x40a000, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r2, 0x7ab, &(0x7f00000000c0)={&(0x7f0000000180)={{@my=0x0, 0x3}, {@any, 0x100}, 0x400, "29eca3cbd146dde745094a2bb0f0d8c23360725136942dfba3119a4d9fa355e37114f643aacb270dff2ba1cbca462d62859c616563a1e6a04913771c3a507d8c1bc17f478d4be2f1ca833bd46f04d7078ed2094b12b20202ff8f8c6a7bcdbdb239f9a15a008c88969a45d18dc7280814a709bbf144079661b2dfb3fc738360d050b0a370eaf4ea9fdfebc63d026b3bb93f62c02b9a1f384fead938b533699bca1d1853d2c22733db843d00873f07cf9256fd415bd1aeff4bc262490d7a220791dfa4d241173398ecf94a5d529e76620eaa1346f9438b6b328c115b4798762e637ab263e552ba9a2d969f653d4bdf2a52c748cff29da0365bc8012090c9048dca256c24473141aeb4df34c87e39bf584452167ef5a6f870ff6f25bb06c2aa62a526e43490e80ea3238f7c7eb45cf4e11f80795c40fb8150b4b51cadaea485b5c889b679cad0baa1573ff502f0268a873653afa4adf677621928b16cf6b5ea5c22f45b2b70a19ea6316846fefb0f070e61e897160e86e7326935c6b3e46050b3a957c4f06c43e31113a114b6b4951d88bae07ada3e4ea7deeadfd2f19fe6cb8147bcfbaa9242a279ab9c7b11084e7c28aab3a22c6469ee7c86c2fbb7e5d034a2faaab6369b0a41a4bd711cfac47df891faf878a0eb10667f39055074fd0f07b7dddc1f6904fe37b80f2c1670dc0ca5e9d27df18ca08f7984e4792cf19e8243548f59e8468e4b9e944fb51d69ff2cd38946b4f51cb5bfeb98532df2780fa48a82752bab7b9697e3354b0b6fe7329d5834acff925d08b9c5ab959ca47cea24a22d05b6787be98d4489616c611096907f21e4a4495069d0f7863566492393961107b122f67b75f4d35ea82372dd1ce68eac908266ad6104cf99494302939d9f65ea7f76dedac0d9adf43194d7917e2b8eb23946b82a540e29835a271931f10512aaa47c60c167893199a96d1ba760a3bed31019c646bc4445a4793b28e58dd50b2e61a355fd2cf1f28517cc93887e0dd949490466a87aa3a0a2569c25186e48dec9e1aa9be88adffa065e24cc8d77694bc1f6409d4b04243786a2e865cba446a76f07ebd0c34fc7c354092279b430a551d6ab8c9a44183d4be957b1fe2be321346569eb873633e958d7919e8b44168506992c8972a4be220215c25c66b67fa9ccbcaf5e6377b0c253f2423502e2c7c94ef5f44e866b1989c4a052628df1d99b1d494650c99082ab7fac66692ec85c53ef565ac7a1ec216e64d3cdcede789fc64933d374b6f79670a8f328c6c1b7f09280856bf8d31fd6422962aa4d41853604e1563befc083fa0eaf80c24f290a587b8c48fd53200eb8deec4ac15bda115c4a00e0c76c4536e85bea760cbf3923f594e36d17f8ba648314245bbadd8078e9cec183a10ef4d3ec5eb4b3446b53d9ad8cd099a95c85da3732bee4e631156b7443ea927e"}, 0x418, 0x5a}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000005c0)) socket$inet6_udp(0xa, 0x2, 0x0) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r2, 0x7a8, &(0x7f0000000180)={{@any, 0x8}, @any, 0x8, 0x0, 0x4, 0xfffffffffffffeff, 0x0, 0x2, 0x8}) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1f}}, 0xdb82}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x1, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x40a000, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r5 = syz_open_dev$ndb(&(0x7f0000000280), 0x0, 0xae242) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r6) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440), 0x900, 0x0) 13:25:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r1, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000005c0)) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r2, 0x7a8, &(0x7f0000000180)={{@any, 0x8}, @any, 0x8, 0x0, 0x4, 0xfffffffffffffeff, 0x0, 0x2, 0x8}) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1f}}, 0xdb82}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x1, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r2, 0x7a8, &(0x7f0000000180)={{@any, 0x8}, @any, 0x8, 0x0, 0x4, 0xfffffffffffffeff, 0x0, 0x2, 0x8}) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1f}}, 0xdb82}, r4}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x1, 0xfa00, {r1}}, 0x10) (async) 13:25:05 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r5 = syz_open_dev$ndb(&(0x7f0000000280), 0x0, 0xae242) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, 0x0) ioctl$NBD_SET_SOCK(r5, 0xab00, r6) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}}}, 0x30) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}}}, 0x30) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_open_dev$ndb(&(0x7f0000000280), 0x0, 0xae242) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) 13:25:05 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r2, 0x7a8, &(0x7f0000000180)={{@any, 0x8}, @any, 0x8, 0x0, 0x4, 0xfffffffffffffeff, 0x0, 0x2, 0x8}) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1f}}, 0xdb82}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x1, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r2, 0x7a8, &(0x7f0000000180)={{@any, 0x8}, @any, 0x8, 0x0, 0x4, 0xfffffffffffffeff, 0x0, 0x2, 0x8}) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1f}}, 0xdb82}, r4}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x1, 0xfa00, {r1}}, 0x10) (async) 13:25:05 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}}}, 0x30) 13:25:05 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) socket$inet6_udp(0xa, 0x2, 0x0) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r0}}, 0x30) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_open_dev$ndb(&(0x7f0000000280), 0x0, 0xae242) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) 13:25:05 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r0}}, 0x30) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) syz_open_dev$ndb(&(0x7f0000000280), 0x0, 0xae242) 13:25:05 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r0}}, 0x30) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x55}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x80) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:05 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) socket$inet6_udp(0xa, 0x2, 0x0) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) 13:25:05 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:05 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3f, 0x6, 0x0, 0x1, 0xe039]}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8001}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xea4a}, @SEG6_ATTR_ALGID={0x5}]}, 0x64}}, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r2, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) 13:25:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_getnetconf={0x1c, 0x52, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000005) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300), 0xffffffffffffffff) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}}}, 0x30) 13:25:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_getnetconf={0x1c, 0x52, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000005) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}}}, 0x30) 13:25:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_getnetconf={0x1c, 0x52, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000005) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}}}, 0x30) 13:25:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r3, 0x70000000}}, 0x10) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r3, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}}}, 0x30) 13:25:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r3, 0x70000000}}, 0x10) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}}}, 0x30) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r0, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r3, 0x70000000}}, 0x10) 13:25:06 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r0, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}}}, 0x30) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r0, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 2: write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000003c0)={0x8, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {}, {0x0, 0x0, 0x0, @broadcast}]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000440)={0x15, 0x110, 0xfa00, {r2, 0x80000000, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"fe89503e39b072c07ed4bff1391c826f"}, 0x7, 0x1a5bdd2d, 0x9}, @in={0x2, 0x4e20, @multicast1}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0xa, 0x20005, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x4, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', r5, 0x2f, 0x5, 0x4, 0x4, 0x4d, @ipv4={'\x00', '\xff\xff', @remote}, @mcast2, 0x8000, 0x80, 0x4, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x106, 0x4}}, 0xfffffedd) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x5, 0x2, "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", 0x0, 0x1, 0x6, 0x81, 0x3f, 0x80, 0x2}, r7}}, 0x128) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 2: write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 2: write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:06 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000003c0)={0x8, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {}, {0x0, 0x0, 0x0, @broadcast}]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000440)={0x15, 0x110, 0xfa00, {r2, 0x80000000, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"fe89503e39b072c07ed4bff1391c826f"}, 0x7, 0x1a5bdd2d, 0x9}, @in={0x2, 0x4e20, @multicast1}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0xa, 0x20005, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x4, 0x6}}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', r5, 0x2f, 0x5, 0x4, 0x4, 0x4d, @ipv4={'\x00', '\xff\xff', @remote}, @mcast2, 0x8000, 0x80, 0x4, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x106, 0x4}}, 0xfffffedd) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x5, 0x2, "1a0cfd37b0a26a3c3cc1df4c7e5dec96aa22ea0bdd7e3483bb4792b804cd74656555464de2a310b9ea57b411554f933124c04a54a2faf2ea14bf87dcfa990e122a0cbbf459e0a39e7bc471291ffeed5fca47d6d8a1c34992d22d38b0ee2f15934e9f543558ce9fe93c5503ba7ad11f7a8473f98992163131d2134d913227b45663c7d442ec4c8de877989b6415e779868506ee15cbf615fb4df622f4b795923a1931a303a574d3580c1c37db21d60742751ea5f88480e769a9f488d13e591c77caa08ca4bf220df08ff2ed3a436da2d8bd84e222898ecce9b952adcd0ed59337d57afe10f3a3a1c2edab98854a55b22870706087b8a2cd8e5cb5d10710c6bb68", 0x0, 0x1, 0x6, 0x81, 0x3f, 0x80, 0x2}, r7}}, 0x128) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r0}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r0}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:06 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000003c0)={0x8, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {}, {0x0, 0x0, 0x0, @broadcast}]}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000440)={0x15, 0x110, 0xfa00, {r2, 0x80000000, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"fe89503e39b072c07ed4bff1391c826f"}, 0x7, 0x1a5bdd2d, 0x9}, @in={0x2, 0x4e20, @multicast1}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0xa, 0x20005, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x4, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', r5, 0x2f, 0x5, 0x4, 0x4, 0x4d, @ipv4={'\x00', '\xff\xff', @remote}, @mcast2, 0x8000, 0x80, 0x4, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0)={0xffffffffffffffff}, 0x106, 0x4}}, 0xfffffedd) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x5, 0x2, "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", 0x0, 0x1, 0x6, 0x81, 0x3f, 0x80, 0x2}, r7}}, 0x128) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) (async) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000003c0)={0x8, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {}, {0x0, 0x0, 0x0, @broadcast}]}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000440)={0x15, 0x110, 0xfa00, {r2, 0x80000000, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"fe89503e39b072c07ed4bff1391c826f"}, 0x7, 0x1a5bdd2d, 0x9}, @in={0x2, 0x4e20, @multicast1}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0xa, 0x20005, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x4, 0x6}}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000700)={'ip6_vti0\x00', &(0x7f0000000680)={'ip6_vti0\x00', r5, 0x2f, 0x5, 0x4, 0x4, 0x4d, @ipv4={'\x00', '\xff\xff', @remote}, @mcast2, 0x8000, 0x80, 0x4, 0x8}}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0), 0x106, 0x4}}, 0xfffffedd) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x5, 0x2, "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", 0x0, 0x1, 0x6, 0x81, 0x3f, 0x80, 0x2}, r7}}, 0x128) (async) 13:25:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r0}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)={0x3, @default, 0xee00}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0xfc, "16821d", "1dda046930b6866276e449b71e0a6fec2b730c9a31700391b643681b5afa0d93e3071d4a554ef4b06030dfd5c4c453d65b1cf155332d1d989a53f5cd2547094e775838f45ce0adfd7e84d181c55ece9a8c261f1ec35f1b423c17a2c682735f1de078e830026279b78bb84c40443ebb1aed68f70ef2515c09c4ef793557730ea5a1e16315bfd2b0c822bfdb76bd8298d7ed178774e1d9add62d4b4746be739a5d32ff5c5bf3e1691d9ccb1d321f58d07c453084d7bccca0112a2d4a9504d1ddf937a6870e621a5e916dd0d00765902c333338fa6246292f687eb3415a28aed2021fe11741cb09e58ba1de933600"}}, 0x110) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYRESOCT=r4, @ANYBLOB="7de21d55663bb6565d24a5edec043e7fd736ab64bb3562da9699b122a06bbb98fbcf6f252463a63e947f75d2ce9a9606513f84294105dddf8d7b7e6a61fbb2514bcc690032f9f09a6627001340dc02d7c9492a70103197", @ANYBLOB="eaff27bdea00fccea62af259db2308db0300", @ANYRES32=0x0, @ANYBLOB="b82c46d82a0700000062c46fda6ff3cbd9c07fdee4fc25e4fe17b4f4cee10c41075fd886b93d4248349e23010a4e778d0000189fb2cd64ff1a2bcedbb7a2f432b68dcb7a295c625b79ab309ffa534bb8d9a6fc8d6e0f74158859ba2d857942b8f78649a9accd000000000000", @ANYRESDEC=r0, @ANYRES16=r2, @ANYRES16=r0], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x2004c001) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0xfffffffffffffd83}, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000500), r3) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x2f, 0xb6, 0x2, 0xfffffb6a, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, 0x8000, 0x7800, 0x4, 0x72}}) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000600)={0x7d4, r5, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_MODES={0x24c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xc7, 0x5, "57726ee5816e240f78bf1622c983b914004a6adf4729fa37c709e807167b9e19b041f47a64441f0777c78a377f996f671797482373023957ebc62f5c281af67075c56497bad33d6cdfb0f664e7464678530f2dac4e665b1042a33e1bee030552a7d32082c406a1378c9b6c28772c32645bffebc32812f3f75babdc3dbd801bd4575f2dbdb4aa060e2562893eae71e3b30352e63a6704bb7b7d4f7c27cbfcc7fc8b8f209e5ac9df4a6772e6580bcd8010e218684da8b9cb867ab64e5191cddc61dd432a"}, @ETHTOOL_A_BITSET_BITS={0x178, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xdab}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd1d2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2681}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\\\xfa$/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '^,[+\x00'}]}]}]}, @ETHTOOL_A_WOL_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_MODES={0x428, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xde, 0x4, "8c4ac3053b9209d71b1ee64fc69da5a62724f20b3e1e725cd2f77da0940c0b3975d4b42693a60250df1ce12dadac35913cfff07e6f5f745d68eae531f88ff12fdac440aafe13f8872d13e637879ea06f39ccf6d8bea338ed44736c03bb627ff0152aecc5f3c1e07ceb71e22bc82ba1afa5a7019a6ce1a9394745d1fde489129e18a8cf59417e43dc88bc53d66072847812a806099acf86565efc0dbc3f1d740fdcd2216fb3c9ff5bd7be80f674635bdc6d8de7feb09dacbd856a6a312036c18b10d5d13b4c56f81fe17f12e07fd62cd3e8783b2a211796dd1748"}, @ETHTOOL_A_BITSET_BITS={0x154, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '*{{-{-:@/\\#^![.}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '&.#-[]-\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x428}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x1a-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'U\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%(#!-![\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0xeb, 0x4, "8105771c74abcaf249c13e6f6de8558e01fccff8ba5d7d44b8fee54ffda25f9df58320474d0feaaf06d5fb28fdf53aded158074c4f7190b8ade62075ce2e61566afdd3fe9b118f5504902b3cb9a1a363157266ed7b4d419b1819209dc799bd5bd6fda3501b0c5fd5c83dfb6857d78ac85ff72854a7d520eb821bdc03418966267b3b43ff044d0e282a358e981e4291da6c63052ca68705565ef7fdb044fcdd29167c8d4fe7a6c31e1c73363fce3b730e1d4f788010d8a7f439790ef4e1689c0220a8dfe5ae5fbc53ccb167fa44cae19038138a7d0ce06040b21609b92fd56d2e470bcd4750f374"}, @ETHTOOL_A_BITSET_VALUE={0xfa, 0x4, "32a3c26d51285347a53bf9b312fd73ca2212de602032766bc7555c43f61b9f2eb7c60b58afc6b5c53759939e5c580ff770103e7a2b231785f263d453b858c7e113814d78d60709e4117e25ac6b71c374fec143260d354c66233c5efe15bab344cf5b376389b52efe3280c44ab0f7d8ff3fca831427defdcd195f185c740b84def2326e84a0aa1e2ebed8bffc3b145cfb345803b3ca19ec382af1ca0c066b9b052396fb1094a65cfe6922c38e2544312889d0d72d73a7cbcea130e6ab05e6d8cb67e69659fa93dd4d3d7debef97051a08b61d7fc690cb84755aaa1e293b202a795eaa90ff4eaf4869c4ebd93a9576680ddb5abcd811e3"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8001}]}, @ETHTOOL_A_WOL_SOPASS={0xfe, 0x3, "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"}]}, 0x7d4}, 0x1, 0x0, 0x0, 0xa009}, 0x4810) 13:25:06 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0x3}, r1}}, 0x30) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:06 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 13:25:06 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 13:25:07 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)={0x3, @default, 0xee00}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0xfc, "16821d", "1dda046930b6866276e449b71e0a6fec2b730c9a31700391b643681b5afa0d93e3071d4a554ef4b06030dfd5c4c453d65b1cf155332d1d989a53f5cd2547094e775838f45ce0adfd7e84d181c55ece9a8c261f1ec35f1b423c17a2c682735f1de078e830026279b78bb84c40443ebb1aed68f70ef2515c09c4ef793557730ea5a1e16315bfd2b0c822bfdb76bd8298d7ed178774e1d9add62d4b4746be739a5d32ff5c5bf3e1691d9ccb1d321f58d07c453084d7bccca0112a2d4a9504d1ddf937a6870e621a5e916dd0d00765902c333338fa6246292f687eb3415a28aed2021fe11741cb09e58ba1de933600"}}, 0x110) (async) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYRESOCT=r4, @ANYBLOB="7de21d55663bb6565d24a5edec043e7fd736ab64bb3562da9699b122a06bbb98fbcf6f252463a63e947f75d2ce9a9606513f84294105dddf8d7b7e6a61fbb2514bcc690032f9f09a6627001340dc02d7c9492a70103197", @ANYBLOB="eaff27bdea00fccea62af259db2308db0300", @ANYRES32=0x0, @ANYBLOB="b82c46d82a0700000062c46fda6ff3cbd9c07fdee4fc25e4fe17b4f4cee10c41075fd886b93d4248349e23010a4e778d0000189fb2cd64ff1a2bcedbb7a2f432b68dcb7a295c625b79ab309ffa534bb8d9a6fc8d6e0f74158859ba2d857942b8f78649a9accd000000000000", @ANYRESDEC=r0, @ANYRES16=r2, @ANYRES16=r0], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x2004c001) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0xfffffffffffffd83}, 0x10) (async) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000500), r3) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x2f, 0xb6, 0x2, 0xfffffb6a, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, 0x8000, 0x7800, 0x4, 0x72}}) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000600)={0x7d4, r5, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_MODES={0x24c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xc7, 0x5, "57726ee5816e240f78bf1622c983b914004a6adf4729fa37c709e807167b9e19b041f47a64441f0777c78a377f996f671797482373023957ebc62f5c281af67075c56497bad33d6cdfb0f664e7464678530f2dac4e665b1042a33e1bee030552a7d32082c406a1378c9b6c28772c32645bffebc32812f3f75babdc3dbd801bd4575f2dbdb4aa060e2562893eae71e3b30352e63a6704bb7b7d4f7c27cbfcc7fc8b8f209e5ac9df4a6772e6580bcd8010e218684da8b9cb867ab64e5191cddc61dd432a"}, @ETHTOOL_A_BITSET_BITS={0x178, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xdab}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd1d2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2681}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\\\xfa$/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '^,[+\x00'}]}]}]}, @ETHTOOL_A_WOL_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_MODES={0x428, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xde, 0x4, "8c4ac3053b9209d71b1ee64fc69da5a62724f20b3e1e725cd2f77da0940c0b3975d4b42693a60250df1ce12dadac35913cfff07e6f5f745d68eae531f88ff12fdac440aafe13f8872d13e637879ea06f39ccf6d8bea338ed44736c03bb627ff0152aecc5f3c1e07ceb71e22bc82ba1afa5a7019a6ce1a9394745d1fde489129e18a8cf59417e43dc88bc53d66072847812a806099acf86565efc0dbc3f1d740fdcd2216fb3c9ff5bd7be80f674635bdc6d8de7feb09dacbd856a6a312036c18b10d5d13b4c56f81fe17f12e07fd62cd3e8783b2a211796dd1748"}, @ETHTOOL_A_BITSET_BITS={0x154, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '*{{-{-:@/\\#^![.}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '&.#-[]-\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x428}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x1a-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'U\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%(#!-![\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0xeb, 0x4, "8105771c74abcaf249c13e6f6de8558e01fccff8ba5d7d44b8fee54ffda25f9df58320474d0feaaf06d5fb28fdf53aded158074c4f7190b8ade62075ce2e61566afdd3fe9b118f5504902b3cb9a1a363157266ed7b4d419b1819209dc799bd5bd6fda3501b0c5fd5c83dfb6857d78ac85ff72854a7d520eb821bdc03418966267b3b43ff044d0e282a358e981e4291da6c63052ca68705565ef7fdb044fcdd29167c8d4fe7a6c31e1c73363fce3b730e1d4f788010d8a7f439790ef4e1689c0220a8dfe5ae5fbc53ccb167fa44cae19038138a7d0ce06040b21609b92fd56d2e470bcd4750f374"}, @ETHTOOL_A_BITSET_VALUE={0xfa, 0x4, "32a3c26d51285347a53bf9b312fd73ca2212de602032766bc7555c43f61b9f2eb7c60b58afc6b5c53759939e5c580ff770103e7a2b231785f263d453b858c7e113814d78d60709e4117e25ac6b71c374fec143260d354c66233c5efe15bab344cf5b376389b52efe3280c44ab0f7d8ff3fca831427defdcd195f185c740b84def2326e84a0aa1e2ebed8bffc3b145cfb345803b3ca19ec382af1ca0c066b9b052396fb1094a65cfe6922c38e2544312889d0d72d73a7cbcea130e6ab05e6d8cb67e69659fa93dd4d3d7debef97051a08b61d7fc690cb84755aaa1e293b202a795eaa90ff4eaf4869c4ebd93a9576680ddb5abcd811e3"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8001}]}, @ETHTOOL_A_WOL_SOPASS={0xfe, 0x3, "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"}]}, 0x7d4}, 0x1, 0x0, 0x0, 0xa009}, 0x4810) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, r1}}, 0x30) 13:25:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)={0x3, @default, 0xee00}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0xfc, "16821d", "1dda046930b6866276e449b71e0a6fec2b730c9a31700391b643681b5afa0d93e3071d4a554ef4b06030dfd5c4c453d65b1cf155332d1d989a53f5cd2547094e775838f45ce0adfd7e84d181c55ece9a8c261f1ec35f1b423c17a2c682735f1de078e830026279b78bb84c40443ebb1aed68f70ef2515c09c4ef793557730ea5a1e16315bfd2b0c822bfdb76bd8298d7ed178774e1d9add62d4b4746be739a5d32ff5c5bf3e1691d9ccb1d321f58d07c453084d7bccca0112a2d4a9504d1ddf937a6870e621a5e916dd0d00765902c333338fa6246292f687eb3415a28aed2021fe11741cb09e58ba1de933600"}}, 0x110) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYRESOCT=r4, @ANYBLOB="7de21d55663bb6565d24a5edec043e7fd736ab64bb3562da9699b122a06bbb98fbcf6f252463a63e947f75d2ce9a9606513f84294105dddf8d7b7e6a61fbb2514bcc690032f9f09a6627001340dc02d7c9492a70103197", @ANYBLOB="eaff27bdea00fccea62af259db2308db0300", @ANYRES32=0x0, @ANYBLOB="b82c46d82a0700000062c46fda6ff3cbd9c07fdee4fc25e4fe17b4f4cee10c41075fd886b93d4248349e23010a4e778d0000189fb2cd64ff1a2bcedbb7a2f432b68dcb7a295c625b79ab309ffa534bb8d9a6fc8d6e0f74158859ba2d857942b8f78649a9accd000000000000", @ANYRESDEC=r0, @ANYRES16=r2, @ANYRES16=r0], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x2004c001) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0xfffffffffffffd83}, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000500), r3) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x2f, 0xb6, 0x2, 0xfffffb6a, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, 0x8000, 0x7800, 0x4, 0x72}}) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000600)={0x7d4, r5, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_MODES={0x24c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xc7, 0x5, "57726ee5816e240f78bf1622c983b914004a6adf4729fa37c709e807167b9e19b041f47a64441f0777c78a377f996f671797482373023957ebc62f5c281af67075c56497bad33d6cdfb0f664e7464678530f2dac4e665b1042a33e1bee030552a7d32082c406a1378c9b6c28772c32645bffebc32812f3f75babdc3dbd801bd4575f2dbdb4aa060e2562893eae71e3b30352e63a6704bb7b7d4f7c27cbfcc7fc8b8f209e5ac9df4a6772e6580bcd8010e218684da8b9cb867ab64e5191cddc61dd432a"}, @ETHTOOL_A_BITSET_BITS={0x178, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xdab}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd1d2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2681}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\\\xfa$/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '^,[+\x00'}]}]}]}, @ETHTOOL_A_WOL_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_MODES={0x428, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xde, 0x4, "8c4ac3053b9209d71b1ee64fc69da5a62724f20b3e1e725cd2f77da0940c0b3975d4b42693a60250df1ce12dadac35913cfff07e6f5f745d68eae531f88ff12fdac440aafe13f8872d13e637879ea06f39ccf6d8bea338ed44736c03bb627ff0152aecc5f3c1e07ceb71e22bc82ba1afa5a7019a6ce1a9394745d1fde489129e18a8cf59417e43dc88bc53d66072847812a806099acf86565efc0dbc3f1d740fdcd2216fb3c9ff5bd7be80f674635bdc6d8de7feb09dacbd856a6a312036c18b10d5d13b4c56f81fe17f12e07fd62cd3e8783b2a211796dd1748"}, @ETHTOOL_A_BITSET_BITS={0x154, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '*{{-{-:@/\\#^![.}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '&.#-[]-\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x428}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x1a-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'U\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%(#!-![\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0xeb, 0x4, "8105771c74abcaf249c13e6f6de8558e01fccff8ba5d7d44b8fee54ffda25f9df58320474d0feaaf06d5fb28fdf53aded158074c4f7190b8ade62075ce2e61566afdd3fe9b118f5504902b3cb9a1a363157266ed7b4d419b1819209dc799bd5bd6fda3501b0c5fd5c83dfb6857d78ac85ff72854a7d520eb821bdc03418966267b3b43ff044d0e282a358e981e4291da6c63052ca68705565ef7fdb044fcdd29167c8d4fe7a6c31e1c73363fce3b730e1d4f788010d8a7f439790ef4e1689c0220a8dfe5ae5fbc53ccb167fa44cae19038138a7d0ce06040b21609b92fd56d2e470bcd4750f374"}, @ETHTOOL_A_BITSET_VALUE={0xfa, 0x4, "32a3c26d51285347a53bf9b312fd73ca2212de602032766bc7555c43f61b9f2eb7c60b58afc6b5c53759939e5c580ff770103e7a2b231785f263d453b858c7e113814d78d60709e4117e25ac6b71c374fec143260d354c66233c5efe15bab344cf5b376389b52efe3280c44ab0f7d8ff3fca831427defdcd195f185c740b84def2326e84a0aa1e2ebed8bffc3b145cfb345803b3ca19ec382af1ca0c066b9b052396fb1094a65cfe6922c38e2544312889d0d72d73a7cbcea130e6ab05e6d8cb67e69659fa93dd4d3d7debef97051a08b61d7fc690cb84755aaa1e293b202a795eaa90ff4eaf4869c4ebd93a9576680ddb5abcd811e3"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8001}]}, @ETHTOOL_A_WOL_SOPASS={0xfe, 0x3, "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"}]}, 0x7d4}, 0x1, 0x0, 0x0, 0xa009}, 0x4810) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)={0x3, @default, 0xee00}) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r1, 0xfc, "16821d", "1dda046930b6866276e449b71e0a6fec2b730c9a31700391b643681b5afa0d93e3071d4a554ef4b06030dfd5c4c453d65b1cf155332d1d989a53f5cd2547094e775838f45ce0adfd7e84d181c55ece9a8c261f1ec35f1b423c17a2c682735f1de078e830026279b78bb84c40443ebb1aed68f70ef2515c09c4ef793557730ea5a1e16315bfd2b0c822bfdb76bd8298d7ed178774e1d9add62d4b4746be739a5d32ff5c5bf3e1691d9ccb1d321f58d07c453084d7bccca0112a2d4a9504d1ddf937a6870e621a5e916dd0d00765902c333338fa6246292f687eb3415a28aed2021fe11741cb09e58ba1de933600"}}, 0x110) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYRESOCT=r4, @ANYBLOB="7de21d55663bb6565d24a5edec043e7fd736ab64bb3562da9699b122a06bbb98fbcf6f252463a63e947f75d2ce9a9606513f84294105dddf8d7b7e6a61fbb2514bcc690032f9f09a6627001340dc02d7c9492a70103197", @ANYBLOB="eaff27bdea00fccea62af259db2308db0300", @ANYRES32=0x0, @ANYBLOB="b82c46d82a0700000062c46fda6ff3cbd9c07fdee4fc25e4fe17b4f4cee10c41075fd886b93d4248349e23010a4e778d0000189fb2cd64ff1a2bcedbb7a2f432b68dcb7a295c625b79ab309ffa534bb8d9a6fc8d6e0f74158859ba2d857942b8f78649a9accd000000000000", @ANYRESDEC=r0, @ANYRES16=r2, @ANYRES16=r0], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x2004c001) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0xfffffffffffffd83}, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000500), r3) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0x2f, 0xb6, 0x2, 0xfffffb6a, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, @empty, 0x8000, 0x7800, 0x4, 0x72}}) (async) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000600)={0x7d4, r5, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_MODES={0x24c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0xc7, 0x5, "57726ee5816e240f78bf1622c983b914004a6adf4729fa37c709e807167b9e19b041f47a64441f0777c78a377f996f671797482373023957ebc62f5c281af67075c56497bad33d6cdfb0f664e7464678530f2dac4e665b1042a33e1bee030552a7d32082c406a1378c9b6c28772c32645bffebc32812f3f75babdc3dbd801bd4575f2dbdb4aa060e2562893eae71e3b30352e63a6704bb7b7d4f7c27cbfcc7fc8b8f209e5ac9df4a6772e6580bcd8010e218684da8b9cb867ab64e5191cddc61dd432a"}, @ETHTOOL_A_BITSET_BITS={0x178, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xdab}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd1d2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2681}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\\\xfa$/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '^,[+\x00'}]}]}]}, @ETHTOOL_A_WOL_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_WOL_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_MODES={0x428, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xde, 0x4, "8c4ac3053b9209d71b1ee64fc69da5a62724f20b3e1e725cd2f77da0940c0b3975d4b42693a60250df1ce12dadac35913cfff07e6f5f745d68eae531f88ff12fdac440aafe13f8872d13e637879ea06f39ccf6d8bea338ed44736c03bb627ff0152aecc5f3c1e07ceb71e22bc82ba1afa5a7019a6ce1a9394745d1fde489129e18a8cf59417e43dc88bc53d66072847812a806099acf86565efc0dbc3f1d740fdcd2216fb3c9ff5bd7be80f674635bdc6d8de7feb09dacbd856a6a312036c18b10d5d13b4c56f81fe17f12e07fd62cd3e8783b2a211796dd1748"}, @ETHTOOL_A_BITSET_BITS={0x154, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '*{{-{-:@/\\#^![.}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '&.#-[]-\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x428}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\x1a-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, 'U\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '%(#!-![\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0xeb, 0x4, "8105771c74abcaf249c13e6f6de8558e01fccff8ba5d7d44b8fee54ffda25f9df58320474d0feaaf06d5fb28fdf53aded158074c4f7190b8ade62075ce2e61566afdd3fe9b118f5504902b3cb9a1a363157266ed7b4d419b1819209dc799bd5bd6fda3501b0c5fd5c83dfb6857d78ac85ff72854a7d520eb821bdc03418966267b3b43ff044d0e282a358e981e4291da6c63052ca68705565ef7fdb044fcdd29167c8d4fe7a6c31e1c73363fce3b730e1d4f788010d8a7f439790ef4e1689c0220a8dfe5ae5fbc53ccb167fa44cae19038138a7d0ce06040b21609b92fd56d2e470bcd4750f374"}, @ETHTOOL_A_BITSET_VALUE={0xfa, 0x4, "32a3c26d51285347a53bf9b312fd73ca2212de602032766bc7555c43f61b9f2eb7c60b58afc6b5c53759939e5c580ff770103e7a2b231785f263d453b858c7e113814d78d60709e4117e25ac6b71c374fec143260d354c66233c5efe15bab344cf5b376389b52efe3280c44ab0f7d8ff3fca831427defdcd195f185c740b84def2326e84a0aa1e2ebed8bffc3b145cfb345803b3ca19ec382af1ca0c066b9b052396fb1094a65cfe6922c38e2544312889d0d72d73a7cbcea130e6ab05e6d8cb67e69659fa93dd4d3d7debef97051a08b61d7fc690cb84755aaa1e293b202a795eaa90ff4eaf4869c4ebd93a9576680ddb5abcd811e3"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8001}]}, @ETHTOOL_A_WOL_SOPASS={0xfe, 0x3, "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"}]}, 0x7d4}, 0x1, 0x0, 0x0, 0xa009}, 0x4810) (async) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}}, 0x30) 13:25:07 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$6lowpan_control(r0, &(0x7f00000000c0)='connect aa:aa:aa:aa:aa:11 0', 0x1b) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}}, 0x30) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) socketpair(0x28, 0x80000, 0xffff6a70, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f0000000140)=0x3, 0x4) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000580)={'gretap0\x00', &(0x7f0000000540)={'erspan0\x00', 0x0, 0x1, 0x10, 0x7, 0x8, {{0x6, 0x4, 0x0, 0x8, 0x18, 0x64, 0x0, 0x0, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x13}, {[@ra={0x94, 0x4}]}}}}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r9, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) r11 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r11, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r12, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000001000)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x632cea857240752}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000600)={0x998, 0x0, 0x800, 0x70bd2c, 0x25dfdbff, {}, [{{0x8}, {0x208, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0xfff7, 0x7f, 0x3, 0xe1a4}, {0x0, 0x81, 0x3}, {0x100, 0x9c, 0x5, 0x5}, {0x4, 0x81, 0x7, 0x5}, {0x101, 0x2, 0xca, 0x3}, {0x9, 0x9, 0x3f, 0xffff075b}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1a8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x24c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0xac, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}]}}]}, 0x998}, 0x1, 0x0, 0x0, 0x4}, 0x40004) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r2, 0x0, 0x2, 0x4}}, 0x20) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e22, @multicast2}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}}}, 0x30) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r1, 0x5, 0x0, 0x0, 0x0, @ib={0x1b, 0x1, 0x7f, {"d739900c318605dfecce18291b7ebaf9"}, 0x7, 0x5, 0x1}, @ib={0x1b, 0x4, 0x800, {"05f0f114dbd4cf9ba2ba0fb9ee476938"}, 0x9, 0x0, 0xfffffffffffffff7}}}, 0x118) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e22, @multicast2}}}, 0x90) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380), 0xd00, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r5, 0x425}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2c400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, r5, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8001}, 0x41) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100)=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000500)={0x7fffffff, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000540)={0x0, r1}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xffffffffffffffb4, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r2, 0x0, 0x2, 0x4}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000700)={0x8, 0x120, 0xfa00, {0x1, {0x1, 0x5ff, "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", 0x4, 0x9, 0x8, 0x7c, 0x0, 0x5, 0x3, 0x1}, r2}}, 0x128) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r2, 0x2, "048209", "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"}}, 0x110) socketpair(0x18, 0x4, 0x1ff, &(0x7f0000000580)={0xffffffffffffffff}) sendmsg$SEG6_CMD_GET_TUNSRC(r5, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20044414}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x4c, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x20}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20001068}, 0x800) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r2, 0x3f280747}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x400000000, {0x7, 0x7, "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", 0xf3, 0xf8, 0x92, 0xb1, 0x5, 0x81, 0xf9, 0x1}, r2}}, 0x128) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e22, @multicast2}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e22, @multicast2}}}, 0x90) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380), 0xd00, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r5, 0x425}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2c400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, r5, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8001}, 0x41) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380), 0xd00, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r5, 0x425}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2c400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x4c, r5, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xffff}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8001}, 0x41) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e20, 0x80, @ipv4={'\x00', '\xff\xff', @loopback}, 0x4}}}, 0x38) write$midi(r1, &(0x7f0000000200)="38f539460d2a97225b58dcee4fa66b10f37b5b4264cbf7ee93a6bca307f3f66326b2422eb7e11f55f649355c73d979bda34461ab19c3d4fcabf013a2aee049d75a85c593d4121301c905af30fa09936a724eb12cdf869458c0aa02f149da5cd754edb4d1525ef410e227195caa5ed83a045ea956673855116e24d703adc93b883fb07cb801c04e1394fa3a2be628c8e602d55b0da88e7de79a1a769e9598f834afbe12dddb1ea68cd6ebfb04308d5deb8cc651718ebec8c4694e496a42c45e377bc8fef1fd9a6249ae8d6666f5902395c15bf345b42cf8", 0xd7) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000300)={0xf, 0x8, 0xfa00, {r4, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0xfffffffffffffffe, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r5}}, 0x30) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffff7, 0x1, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000080)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380), 0xd00, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r5, 0x425}, 0x14}}, 0x0) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffff7, 0x1, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000080)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffff7, 0x1, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000080)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380), 0xd00, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYBLOB="33fdf290ab7e760c66d3715be18b87e393ea2cae9cfc5347211c7890a33177fdf2d8c9eaa6e1ba3d416ead7b568c27e4032d066c683198f91ad197472cb0b012d52fee06f6ab67f7f07b82497e6a53335c61ba06604fa0fda128701f49a802bce43b16fc8ab85d0fc3e2f89db64042f732f2da9d91631e5ef79a6d129efac89d6333fdf77c87770aff5b49cdba20bcba543807069553247ced961041c850", @ANYRES16=0x0, @ANYBLOB="000026bd7000ffdbdf250c000000080004000000000043f284959fe828e694917875ce73f0f073d67a4a3cd89674f0e19a4e090e52b3c3576aac2901a166af86e7ec6258dea38d917d881688a9da073b27a99815853ce2030c1ed30847ca6fef71d93431f061adb645c9c8fcf56e858a2a93e770b49f0c0587e3346d24b865997d15980d7bc0ec4942afd0b61ea15565414bd2"], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000200)={0x7ff, 0x8, 0x7, @empty, 'ip6gretap0\x00'}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x8c, 0x0, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6f}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x36}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xefce}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4ea}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x80}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8010}, 0x615787e951b0c72) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r3) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x60, r4, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000080}, 0x10) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffff7, 0x1, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000080)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r1, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r6, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) r8 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r9, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000f80)={&(0x7f0000001000)=ANY=[@ANYBLOB="800a0000", @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdf250200000008000100", @ANYRES32=0x0, @ANYBLOB="10010280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000500000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004000900000008000700000000004c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000700000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400000800003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="9c01028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004008100000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400f7ffffff08000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000004000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000900000008000100", @ANYRES32=0x0, @ANYBLOB="3001028038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400000000003c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e00000008000400c000000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400bbe9000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000e00040062726f61646361737400000008000100", @ANYRES32=0x0, @ANYBLOB="5c02028038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004005a0000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000500000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004009130000008000600", @ANYRES32=0x0, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004004000000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700000000003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000b00040072616e646f6d000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000000000838000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000900000008000100", @ANYRES32=0x0, @ANYBLOB="840202803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r1, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000100008038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000100000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004001300000008000600", @ANYRES32=r4, @ANYBLOB="6c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000003c0004000101000103000000860a00ff020000000600067503000000070006030180000006000501ffffff7f550004070500000006000749010000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB], 0xa80}, 0x1, 0x0, 0x0, 0x44000}, 0x840) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r10}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r10}}, 0x10) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380), 0xd00, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 13:25:07 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:07 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x80000000}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) 13:25:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffff7, 0x1, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) 13:25:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x0, 0x0, @ib={0x1b, 0xa227, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000100)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0x85, 0xffff, "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", 0x1, 0x9, 0xff, 0x9, 0x5, 0x59, 0xfd, 0x1}, r1}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000280)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x7, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffff7, 0x1, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380), 0xd00, 0x0) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f00000000c0)={0x3, @null, 0xee00}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0xffffffff, 0x7f, 0x3e65}}}, 0x90) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffff7, 0x1, 0x7}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0x0, 0x7f, 0x3e65}}}, 0x90) 13:25:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) 13:25:08 executing program 0: read$midi(0xffffffffffffffff, &(0x7f00000003c0)=""/4096, 0x1000) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x800, @empty, 0xff}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340)=0x4, r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffff7, 0x1, 0x7}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}, 0x0, 0x0, 0x3e65}}}, 0x90) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x7, 0x7, "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", 0x1, 0x9, 0x7, 0x2a, 0x0, 0x7, 0x3}, r4}}, 0x120) 13:25:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffff7, 0x1, 0x7}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r3, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xc4, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe93f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8a}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x960}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xc2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xcd}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0xc4}, 0x1, 0x0, 0x0, 0x48000}, 0xc800) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r4}}, 0x30) 13:25:08 executing program 0: r0 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x800) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000440)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x8001, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200), 0x44102, 0x0) sendmsg$nl_crypto(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=@del={0x100, 0x11, 0x2, 0x70bd25, 0x25dfdbff, {{'essiv(rfc4543(aegis128-aesni),sha224-ni)\x00'}, '\x00', '\x00', 0x2000, 0x2000}, [{0x8, 0x1, 0x1}, {0x8, 0x1, 0x9}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x1}]}, 0x100}, 0x1, 0x0, 0x0, 0x40000}, 0x4000080) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), 0xffffffffffffffff) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000004c0), r4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000080)=0xf2d3d9b) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r2, 0xc0245720, &(0x7f00000001c0)) socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x3, @remote, 0x1}, r5}}, 0x30) socket$inet6_udplite(0xa, 0x2, 0x88) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 1: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e23, 0x7f, @local, 0x8}, r1}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r4, 0x101, 0x0, 0x0, 0x0, @ib={0x1b, 0x1, 0x0, {"8085d0cc259028d7a32b30b1b4b64ada"}, 0x4, 0x1, 0x3ff}, @in={0x2, 0x4e22, @empty}}}, 0x118) 13:25:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x6, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 1: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 1: write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf250200000008000100000000000c00060003000000000000000c00078008000100", @ANYRES32=r0, @ANYBLOB="13a12a2b3e4c430cb3e8cd0ce798ca35d9e0c74ee36071cc13ee40abed19fec01a453971ab4f46d20aa42e1b2932bda8c604bb66150f7eebf43df8f90ff51e23b662c7bf5e025dd5d7f454573b5f83a6586efe45e572e8825abb191f1fda2082bea522e31139d6a461c99741dac12b408309300291d8be80fc572bbaae1f318d5980fa7f75168bd751863895aff600"/157], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r4}}, 0x18) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x0, 0x0, [0x0, 0x7, 0x4, 0x80000000, 0xf5cc, 0x3f, 0x81, 0x8001, 0x20, 0x1, 0x4, 0x1, 0x6, 0x9, 0xe, 0x7ff]}], r1, 0x1, 0x1, 0x48}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fddbdf250200000008000100000000000c00060003000000000000000c00078008000100", @ANYRES32=r0, @ANYBLOB="13a12a2b3e4c430cb3e8cd0ce798ca35d9e0c74ee36071cc13ee40abed19fec01a453971ab4f46d20aa42e1b2932bda8c604bb66150f7eebf43df8f90ff51e23b662c7bf5e025dd5d7f454573b5f83a6586efe45e572e8825abb191f1fda2082bea522e31139d6a461c99741dac12b408309300291d8be80fc572bbaae1f318d5980fa7f75168bd751863895aff600"/157], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3}}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r4}}, 0x18) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r0}}, 0x30) 13:25:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r0}}, 0x30) 13:25:08 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r0}}, 0x30) 13:25:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r3, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) (fail_nth: 1) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (fail_nth: 1) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0xb9}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1f, "c372ea", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r2, 0x20, 0x0, 0x0, 0x0, @ib={0x1b, 0x9, 0x2, {"dc44f6717f2724334dde60ee3dcd2e7f"}, 0x750, 0x800, 0x2}, @in6={0xa, 0x4e21, 0x80000000, @ipv4={'\x00', '\xff\xff', @local}, 0xef}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x4, "7f2a5e", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 13:25:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e20, 0x8, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, 0x90) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (rerun: 32) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 13:25:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 13:25:08 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) (async, rerun: 32) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1f, "c372ea", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r2, 0x20, 0x0, 0x0, 0x0, @ib={0x1b, 0x9, 0x2, {"dc44f6717f2724334dde60ee3dcd2e7f"}, 0x750, 0x800, 0x2}, @in6={0xa, 0x4e21, 0x80000000, @ipv4={'\x00', '\xff\xff', @local}, 0xef}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x4, "7f2a5e", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, 0x0, 0x0) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:08 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r5}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x1, {0x9f27, 0x8, "bcc087d4ce2c1a7e0f45ed45056a345f3488a10ba6c3330bb3d78b82124c87fb135c613c3945b28c259544ad2e73490f55e9f5d472462de9b100dc1de0116ab3246da01ad971873d30ada744ede8847fa74eac5d189eca49e04197087d4e8f6c8b50b761dabb5cb115de63e20a821af69aa09f2e2fabbf2956a5e3c2195f100097f2dd26353d437f6b8d61347e97d30421d1660808d0243a97c15916db5a1f0a03a0b726d18e34d7829ee5678853de75311d4cdd8cdf34f204dced856e48f1d173b2db2566ab93d5745c0dc1c5ba4c54df35957f93633dac71422df04ea913709b1f983fc663045353edd1bfd9e4431d9b813a9700fcd713b3cd74ac7af42a12", 0x6, 0x20, 0x5, 0x20, 0x9, 0x2a, 0x6, 0x1}, r7}}, 0x128) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000640)={'vcan0\x00'}) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r8, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000480), 0x2, {0xa, 0x4e24, 0x76, @empty, 0x3ff}, r1}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r3, 0x3f, 0x0, 0x0, 0x0, @ib={0x1b, 0x3, 0x1c5, {"44238556ddaee9d05763f739240ee043"}, 0xbcc, 0x5, 0x400}, @in6={0xa, 0x4e23, 0x7f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10001}}}, 0x118) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e20, 0x4, @ipv4={'\x00', '\xff\xff', @loopback}}}}, 0x31) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:08 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 13:25:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) 13:25:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1f, "c372ea", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r2, 0x20, 0x0, 0x0, 0x0, @ib={0x1b, 0x9, 0x2, {"dc44f6717f2724334dde60ee3dcd2e7f"}, 0x750, 0x800, 0x2}, @in6={0xa, 0x4e21, 0x80000000, @ipv4={'\x00', '\xff\xff', @local}, 0xef}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x4, "7f2a5e", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r4}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 13:25:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r5}}, 0x18) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x1, {0x9f27, 0x8, "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", 0x6, 0x20, 0x5, 0x20, 0x9, 0x2a, 0x6, 0x1}, r7}}, 0x128) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000640)={'vcan0\x00'}) (async) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r8, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000480), 0x2, {0xa, 0x4e24, 0x76, @empty, 0x3ff}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r3, 0x3f, 0x0, 0x0, 0x0, @ib={0x1b, 0x3, 0x1c5, {"44238556ddaee9d05763f739240ee043"}, 0xbcc, 0x5, 0x400}, @in6={0xa, 0x4e23, 0x7f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10001}}}, 0x118) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e20, 0x4, @ipv4={'\x00', '\xff\xff', @loopback}}}}, 0x31) 13:25:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x1f, "c372ea", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000004c0)={0x15, 0x110, 0xfa00, {r2, 0x20, 0x0, 0x0, 0x0, @ib={0x1b, 0x9, 0x2, {"dc44f6717f2724334dde60ee3dcd2e7f"}, 0x750, 0x800, 0x2}, @in6={0xa, 0x4e21, 0x80000000, @ipv4={'\x00', '\xff\xff', @local}, 0xef}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r2, 0x4, "7f2a5e", "f34ba54d90d675ee77628549336e809727c5df00bce715ffead0b3ebc5df69da47818533c3d0b78a3798cd7c03da6d62055e58dcee1a01789df555b7f3f6de74314bd01829126087045454789e10dcf07b924c52de1d0f99fb6b0f9db94231070b558cc5591917d4f1177d40a1ca24bafaa4e9791275af7fdc49cfdd1b6c0963a609d1674f47eb40541eb45ab2065b3ba261fb34afbf449894c126217aa2634e00cb3cd5806c94b83a66e7156fd77064c74a864f209fdcf2184146bad12215359412b6d95ea7b61f103c53357cba96709c4fce278ff0fb641e101acf4b7378ab6001edea4b85af76e4edc93c24e62536be8b96f1dac97bde688f3e79aae4d568"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r4}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, 0x0, 0x0) 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r1, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x8, &(0x7f0000000180)={0xffffffffffffffff}, 0x30e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x400, @loopback, 0x10000}, r3}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (fail_nth: 1) 13:25:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) (fail_nth: 1) 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r1, r5}}, 0x18) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000500)={0x8, 0x120, 0xfa00, {0x1, {0x9f27, 0x8, "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", 0x6, 0x20, 0x5, 0x20, 0x9, 0x2a, 0x6, 0x1}, r7}}, 0x128) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000640)={'vcan0\x00'}) (async) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r8, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r8, &(0x7f00000004c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000480), 0x2, {0xa, 0x4e24, 0x76, @empty, 0x3ff}, r1}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r3, 0x3f, 0x0, 0x0, 0x0, @ib={0x1b, 0x3, 0x1c5, {"44238556ddaee9d05763f739240ee043"}, 0xbcc, 0x5, 0x400}, @in6={0xa, 0x4e23, 0x7f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10001}}}, 0x118) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e20, 0x4, @ipv4={'\x00', '\xff\xff', @loopback}}}}, 0x31) 13:25:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1000, @local, 0x7fffffff}}}, 0x30) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r1}}, 0x18) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendto$packet(r5, &(0x7f00000003c0)="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", 0xfa, 0x14, &(0x7f00000002c0)={0x11, 0x16, r7, 0x1, 0x1f}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6tnl0\x00', r4, 0x2f, 0xdb, 0x7f, 0xfffffffd, 0x1, @remote, @mcast1, 0x1, 0x8000, 0x5, 0x9}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={0xffffffffffffffff, r8, 0x25, 0x4}, 0x10) 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) [ 876.334274] FAULT_INJECTION: forcing a failure. [ 876.334274] name failslab, interval 1, probability 0, space 0, times 0 [ 876.352805] CPU: 0 PID: 27543 Comm: syz-executor.1 Not tainted 4.14.298-syzkaller #0 [ 876.360711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 876.370062] Call Trace: [ 876.372654] dump_stack+0x1b2/0x281 [ 876.376286] should_fail.cold+0x10a/0x149 [ 876.380438] should_failslab+0xd6/0x130 [ 876.384415] kmem_cache_alloc_trace+0x29a/0x3d0 [ 876.389079] cma_alloc_port+0xc6/0x300 [ 876.392956] ? __radix_tree_lookup+0x1b5/0x2e0 [ 876.397537] ? rdma_reject+0x2f0/0x2f0 [ 876.401457] rdma_bind_addr+0x1d74/0x23f0 [ 876.405595] ? rdma_connect+0x15c0/0x15c0 [ 876.409725] ? __mutex_unlock_slowpath+0x75/0x770 [ 876.414576] ? __radix_tree_lookup+0x1b5/0x2e0 [ 876.419154] rdma_listen+0x8f/0x9b0 [ 876.422775] ucma_listen+0x10b/0x170 [ 876.426468] ? ucma_bind_ip+0x150/0x150 [ 876.430421] ? _copy_from_user+0x96/0x100 [ 876.434553] ? ucma_bind_ip+0x150/0x150 [ 876.438513] ucma_write+0x206/0x2c0 [ 876.442205] ? ucma_set_ib_path+0x510/0x510 [ 876.446512] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 876.451423] __vfs_write+0xe4/0x630 [ 876.455032] ? ucma_set_ib_path+0x510/0x510 [ 876.459347] ? __handle_mm_fault+0x80f/0x4620 [ 876.463825] ? kernel_read+0x110/0x110 [ 876.467697] ? common_file_perm+0x3ee/0x580 [ 876.472144] ? security_file_permission+0x82/0x1e0 [ 876.477071] ? rw_verify_area+0xe1/0x2a0 [ 876.481122] vfs_write+0x17f/0x4d0 13:25:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r1, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x8, &(0x7f0000000180)={0xffffffffffffffff}, 0x30e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x400, @loopback, 0x10000}, r3}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r1, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x8, &(0x7f0000000180), 0x30e, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x400, @loopback, 0x10000}, r3}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (fail_nth: 2) 13:25:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1000, @local, 0x7fffffff}}}, 0x30) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r1}}, 0x18) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) (async) r6 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) sendto$packet(r5, &(0x7f00000003c0)="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", 0xfa, 0x14, &(0x7f00000002c0)={0x11, 0x16, r7, 0x1, 0x1f}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6tnl0\x00', r4, 0x2f, 0xdb, 0x7f, 0xfffffffd, 0x1, @remote, @mcast1, 0x1, 0x8000, 0x5, 0x9}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={0xffffffffffffffff, r8, 0x25, 0x4}, 0x10) [ 876.484658] SyS_write+0xf2/0x210 [ 876.488090] ? SyS_read+0x210/0x210 [ 876.491695] ? __do_page_fault+0x159/0xad0 [ 876.495946] ? do_syscall_64+0x4c/0x640 [ 876.499904] ? SyS_read+0x210/0x210 [ 876.503516] do_syscall_64+0x1d5/0x640 [ 876.507478] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x40380, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="20002dbd7000fbdbdf250900000008000500ff0700001400028008000800ff0f00000800070001800000080005000080000008000500010000000800060000080000"], 0x48}, 0x1, 0x0, 0x0, 0x40000080}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) 13:25:09 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r0}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 13:25:09 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r0}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) [ 876.613163] FAULT_INJECTION: forcing a failure. [ 876.613163] name failslab, interval 1, probability 0, space 0, times 0 [ 876.637949] CPU: 1 PID: 27580 Comm: syz-executor.1 Not tainted 4.14.298-syzkaller #0 [ 876.645852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 876.655200] Call Trace: [ 876.657783] dump_stack+0x1b2/0x281 13:25:09 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r0}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r0}}, 0x10) 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 876.661415] should_fail.cold+0x10a/0x149 [ 876.665562] should_failslab+0xd6/0x130 [ 876.669536] kmem_cache_alloc+0x28e/0x3c0 [ 876.673684] radix_tree_node_alloc.constprop.0+0x5a/0x2f0 [ 876.679308] idr_get_free_cmn+0x595/0x8d0 [ 876.683466] ? rdma_bind_addr+0x7b2/0x23f0 [ 876.687749] idr_alloc_cmn+0xe8/0x1e0 [ 876.691580] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 876.696421] ? lock_acquire+0x170/0x3f0 [ 876.700404] cma_alloc_port+0x16f/0x300 [ 876.704378] ? rdma_reject+0x2f0/0x2f0 [ 876.708271] rdma_bind_addr+0x1d74/0x23f0 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 876.712428] ? rdma_connect+0x15c0/0x15c0 [ 876.716586] ? __mutex_unlock_slowpath+0x75/0x770 [ 876.721441] ? __radix_tree_lookup+0x1b5/0x2e0 [ 876.726035] rdma_listen+0x8f/0x9b0 [ 876.729674] ucma_listen+0x10b/0x170 [ 876.733402] ? ucma_bind_ip+0x150/0x150 [ 876.737381] ? _copy_from_user+0x96/0x100 [ 876.741527] ? ucma_bind_ip+0x150/0x150 [ 876.745505] ucma_write+0x206/0x2c0 [ 876.749132] ? ucma_set_ib_path+0x510/0x510 [ 876.753448] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 876.758382] __vfs_write+0xe4/0x630 [ 876.762008] ? ucma_set_ib_path+0x510/0x510 [ 876.766327] ? __handle_mm_fault+0x80f/0x4620 [ 876.770813] ? kernel_read+0x110/0x110 [ 876.774680] ? common_file_perm+0x3ee/0x580 [ 876.778982] ? security_file_permission+0x82/0x1e0 [ 876.783899] ? rw_verify_area+0xe1/0x2a0 [ 876.787956] vfs_write+0x17f/0x4d0 [ 876.791493] SyS_write+0xf2/0x210 [ 876.794945] ? SyS_read+0x210/0x210 [ 876.798562] ? __do_page_fault+0x159/0xad0 [ 876.802785] ? do_syscall_64+0x4c/0x640 [ 876.806748] ? SyS_read+0x210/0x210 13:25:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r1, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x8, &(0x7f0000000180)={0xffffffffffffffff}, 0x30e, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x400, @loopback, 0x10000}, r3}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r1, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x8, &(0x7f0000000180), 0x30e, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x400, @loopback, 0x10000}, r3}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (fail_nth: 3) 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x1000, @local, 0x7fffffff}}}, 0x30) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r1}}, 0x18) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0), 0x80000, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, 0x0) (async) r6 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r7, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) sendto$packet(r5, &(0x7f00000003c0)="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", 0xfa, 0x14, &(0x7f00000002c0)={0x11, 0x16, r7, 0x1, 0x1f}, 0x14) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r4, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'ip6tnl0\x00', r4, 0x2f, 0xdb, 0x7f, 0xfffffffd, 0x1, @remote, @mcast1, 0x1, 0x8000, 0x5, 0x9}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={0xffffffffffffffff, r8, 0x25, 0x4}, 0x10) 13:25:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x40380, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) (async) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="20002dbd7000fbdbdf250900000008000500ff0700001400028008000800ff0f00000800070001800000080005000080000008000500010000000800060000080000"], 0x48}, 0x1, 0x0, 0x0, 0x40000080}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) [ 876.810374] do_syscall_64+0x1d5/0x640 [ 876.814336] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 13:25:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4, 0x80000000, "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", 0x0, 0x93, 0x5, 0xff, 0x81, 0x6, 0x6, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:09 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:09 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x40380, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) (rerun: 64) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) (async) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="20002dbd7000fbdbdf250900000008000500ff0700001400028008000800ff0f00000800070001800000080005000080000008000500010000000800060000080000"], 0x48}, 0x1, 0x0, 0x0, 0x40000080}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) [ 876.876032] FAULT_INJECTION: forcing a failure. [ 876.876032] name failslab, interval 1, probability 0, space 0, times 0 13:25:09 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async, rerun: 64) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4, 0x80000000, "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", 0x0, 0x93, 0x5, 0xff, 0x81, 0x6, 0x6, 0x1}, r4}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) [ 876.928810] CPU: 0 PID: 27627 Comm: syz-executor.1 Not tainted 4.14.298-syzkaller #0 [ 876.936720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 876.946167] Call Trace: [ 876.948743] dump_stack+0x1b2/0x281 [ 876.952365] should_fail.cold+0x10a/0x149 [ 876.956531] should_failslab+0xd6/0x130 [ 876.960529] kmem_cache_alloc+0x28e/0x3c0 [ 876.964674] radix_tree_node_alloc.constprop.0+0x5a/0x2f0 [ 876.970202] idr_get_free_cmn+0x595/0x8d0 [ 876.974335] idr_alloc_cmn+0xe8/0x1e0 13:25:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) [ 876.978123] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 876.982961] ? lock_acquire+0x170/0x3f0 [ 876.986952] cma_alloc_port+0x16f/0x300 [ 876.990935] ? rdma_reject+0x2f0/0x2f0 [ 876.994825] rdma_bind_addr+0x1d74/0x23f0 [ 876.998961] ? rdma_connect+0x15c0/0x15c0 [ 877.003086] ? __mutex_unlock_slowpath+0x75/0x770 [ 877.007913] ? __radix_tree_lookup+0x1b5/0x2e0 [ 877.012480] rdma_listen+0x8f/0x9b0 [ 877.016084] ucma_listen+0x10b/0x170 [ 877.019780] ? ucma_bind_ip+0x150/0x150 [ 877.023733] ? _copy_from_user+0x96/0x100 [ 877.027879] ? ucma_bind_ip+0x150/0x150 [ 877.031829] ucma_write+0x206/0x2c0 [ 877.035443] ? ucma_set_ib_path+0x510/0x510 [ 877.039739] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 877.044665] __vfs_write+0xe4/0x630 [ 877.048288] ? ucma_set_ib_path+0x510/0x510 [ 877.052611] ? __handle_mm_fault+0x80f/0x4620 [ 877.057106] ? kernel_read+0x110/0x110 [ 877.061001] ? common_file_perm+0x3ee/0x580 [ 877.065325] ? security_file_permission+0x82/0x1e0 [ 877.070255] ? rw_verify_area+0xe1/0x2a0 [ 877.074312] vfs_write+0x17f/0x4d0 13:25:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (fail_nth: 4) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) [ 877.077837] SyS_write+0xf2/0x210 [ 877.081270] ? SyS_read+0x210/0x210 [ 877.084880] ? __do_page_fault+0x159/0xad0 [ 877.089101] ? do_syscall_64+0x4c/0x640 [ 877.093057] ? SyS_read+0x210/0x210 [ 877.096671] do_syscall_64+0x1d5/0x640 [ 877.100553] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 13:25:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {r1, 0x97, "d7804a", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {r4, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x8e, @private2, 0x1}, @ib={0x1b, 0x1000, 0x6, {"495d404dc1b41fc6a1db6b5d00"}, 0x0, 0xffffffff, 0xfffffffffffffffe}}}, 0x118) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x8000000, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x2, {0xa, 0x4e23, 0x3, @remote, 0xfffffff9}, r4}}, 0x38) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 13:25:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) (rerun: 64) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4, 0x80000000, "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", 0x0, 0x93, 0x5, 0xff, 0x81, 0x6, 0x6, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x4, 0x80000000, "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", 0x0, 0x93, 0x5, 0xff, 0x81, 0x6, 0x6, 0x1}, r4}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {r1, 0x97, "d7804a", "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"}}, 0x110) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {r4, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x8e, @private2, 0x1}, @ib={0x1b, 0x1000, 0x6, {"495d404dc1b41fc6a1db6b5d00"}, 0x0, 0xffffffff, 0xfffffffffffffffe}}}, 0x118) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x8000000, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x2, {0xa, 0x4e23, 0x3, @remote, 0xfffffff9}, r4}}, 0x38) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x2, {0xa, 0x4e23, 0x3, @remote, 0xfffffff9}, r4}}, 0x38) (async) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) (async) 13:25:10 executing program 4: ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @dev}]}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:10 executing program 4: ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @dev}]}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 13:25:10 executing program 4: ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @dev}]}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @dev}]}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) (async) 13:25:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (async, rerun: 64) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x2, {0xa, 0x4e23, 0x3, @remote, 0xfffffff9}, r4}}, 0x38) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r4}}, 0x10) 13:25:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000300)={0x9, 0x108, 0xfa00, {r1, 0x97, "d7804a", "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"}}, 0x110) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {r4, 0x4, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x8e, @private2, 0x1}, @ib={0x1b, 0x1000, 0x6, {"495d404dc1b41fc6a1db6b5d00"}, 0x0, 0xffffffff, 0xfffffffffffffffe}}}, 0x118) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x8000000, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 13:25:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x101020, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x80d0}, 0x4040804) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0xfffffffffffffde0) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:10 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 13:25:10 executing program 1: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@null, @netrom, @default, @remote, @rose, @netrom, @netrom, @bcast]}, &(0x7f0000000280)=0x48, 0x80800) accept$ax25(r0, &(0x7f00000002c0)={{0x3, @null}, [@default, @default, @bcast, @default, @null, @remote, @rose]}, &(0x7f0000000200)=0x2d) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000340)='ns/uts\x00') mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x1280004, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@fscache}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@version_u}, {@cache_mmap}], [{@func={'func', 0x3d, 'PATH_CHECK'}}]}}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r4}}, 0x30) 13:25:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x101020, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) (async) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x80d0}, 0x4040804) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0xfffffffffffffde0) 13:25:10 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:10 executing program 1: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@null, @netrom, @default, @remote, @rose, @netrom, @netrom, @bcast]}, &(0x7f0000000280)=0x48, 0x80800) accept$ax25(r0, &(0x7f00000002c0)={{0x3, @null}, [@default, @default, @bcast, @default, @null, @remote, @rose]}, &(0x7f0000000200)=0x2d) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000340)='ns/uts\x00') mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x1280004, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@fscache}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@version_u}, {@cache_mmap}], [{@func={'func', 0x3d, 'PATH_CHECK'}}]}}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r4}}, 0x30) accept4$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@null, @netrom, @default, @remote, @rose, @netrom, @netrom, @bcast]}, &(0x7f0000000280)=0x48, 0x80800) (async) accept$ax25(r0, &(0x7f00000002c0)={{0x3, @null}, [@default, @default, @bcast, @default, @null, @remote, @rose]}, &(0x7f0000000200)=0x2d) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000340)='ns/uts\x00') (async) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x1280004, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@fscache}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@version_u}, {@cache_mmap}], [{@func={'func', 0x3d, 'PATH_CHECK'}}]}}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r4}}, 0x30) (async) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 13:25:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x101020, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x80d0}, 0x4040804) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0xfffffffffffffde0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x101020, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) (async) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, r4, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}]}, 0x70}, 0x1, 0x0, 0x0, 0x80d0}, 0x4040804) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1, 0x1}}, 0xfffffffffffffde0) (async) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:10 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) (async) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 13:25:10 executing program 1: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@null, @netrom, @default, @remote, @rose, @netrom, @netrom, @bcast]}, &(0x7f0000000280)=0x48, 0x80800) accept$ax25(r0, &(0x7f00000002c0)={{0x3, @null}, [@default, @default, @bcast, @default, @null, @remote, @rose]}, &(0x7f0000000200)=0x2d) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000340)='ns/uts\x00') mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x1280004, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@fscache}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@version_u}, {@cache_mmap}], [{@func={'func', 0x3d, 'PATH_CHECK'}}]}}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r4}}, 0x30) accept4$ax25(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @default}, [@null, @netrom, @default, @remote, @rose, @netrom, @netrom, @bcast]}, &(0x7f0000000280)=0x48, 0x80800) (async) accept$ax25(r0, &(0x7f00000002c0)={{0x3, @null}, [@default, @default, @bcast, @default, @null, @remote, @rose]}, &(0x7f0000000200)=0x2d) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000340)='ns/uts\x00') (async) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x1280004, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@fscache}, {@version_u}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@version_u}, {@cache_mmap}], [{@func={'func', 0x3d, 'PATH_CHECK'}}]}}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r4}}, 0x30) (async) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x6, 0x0, [0xfffff000, 0x9, 0x8, 0x7fff, 0x4, 0x71bf, 0xb2, 0x401, 0x5, 0xa4c, 0x7fff, 0x9, 0x40ba, 0x8, 0x9, 0x6]}, {0x16, 0x0, [0x8, 0x0, 0x2, 0x7, 0x846c, 0x4, 0x4, 0x8, 0x8, 0x80, 0x7, 0x2, 0xff, 0x7f, 0x2, 0xa4]}, {0xc, 0x0, [0x6, 0x4, 0xbe, 0xffffffff, 0x3, 0x7, 0x1, 0x81, 0x5, 0x9, 0x5, 0x81, 0x3f, 0xffffffff, 0xfffffffc, 0x7fff]}], r3, 0x1, 0x1, 0xd8}}, 0x20) 13:25:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) (async) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 13:25:10 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(r4, 0xc1007c01, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x2, @private2, 0xdb82}, r3}}, 0x30) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x6, 0x0, [0xfffff000, 0x9, 0x8, 0x7fff, 0x4, 0x71bf, 0xb2, 0x401, 0x5, 0xa4c, 0x7fff, 0x9, 0x40ba, 0x8, 0x9, 0x6]}, {0x16, 0x0, [0x8, 0x0, 0x2, 0x7, 0x846c, 0x4, 0x4, 0x8, 0x8, 0x80, 0x7, 0x2, 0xff, 0x7f, 0x2, 0xa4]}, {0xc, 0x0, [0x6, 0x4, 0xbe, 0xffffffff, 0x3, 0x7, 0x1, 0x81, 0x5, 0x9, 0x5, 0x81, 0x3f, 0xffffffff, 0xfffffffc, 0x7fff]}], r3, 0x1, 0x1, 0xd8}}, 0x20) 13:25:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) 13:25:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:10 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:10 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) 13:25:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}}}, 0x30) 13:25:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) ioctl$MEDIA_IOC_ENUM_ENTITIES(r4, 0xc1007c01, &(0x7f0000000180)) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x2, @private2, 0xdb82}, r3}}, 0x30) 13:25:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x6, 0x0, [0xfffff000, 0x9, 0x8, 0x7fff, 0x4, 0x71bf, 0xb2, 0x401, 0x5, 0xa4c, 0x7fff, 0x9, 0x40ba, 0x8, 0x9, 0x6]}, {0x16, 0x0, [0x8, 0x0, 0x2, 0x7, 0x846c, 0x4, 0x4, 0x8, 0x8, 0x80, 0x7, 0x2, 0xff, 0x7f, 0x2, 0xa4]}, {0xc, 0x0, [0x6, 0x4, 0xbe, 0xffffffff, 0x3, 0x7, 0x1, 0x81, 0x5, 0x9, 0x5, 0x81, 0x3f, 0xffffffff, 0xfffffffc, 0x7fff]}], r3, 0x1, 0x1, 0xd8}}, 0x20) 13:25:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180), 0x2}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) (async) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) (async) 13:25:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r2}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(0xffffffffffffffff, 0xc0245720, &(0x7f0000000040)={0x1}) 13:25:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r2}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 13:25:11 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x90) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e20, 0x4, @private0, 0x3}}}, 0x90) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000540)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x81, 0x20, 0x1f, 0x1, 0x6, 0x9, 0x74, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r8, 0xffffffe0}}, 0x10) 13:25:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0x30) 13:25:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) (async) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(0xffffffffffffffff, 0xc0245720, &(0x7f0000000040)={0x1}) 13:25:11 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async, rerun: 64) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, 0x0) (async) ioctl$MEDIA_IOC_ENUM_ENTITIES(r4, 0xc1007c01, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x2, @private2, 0xdb82}, r3}}, 0x30) 13:25:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8}, 0x10) 13:25:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) (async) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(0xffffffffffffffff, 0xc0245720, &(0x7f0000000040)={0x1}) 13:25:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) accept4$ax25(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @null}, [@bcast, @default, @null, @null, @rose, @remote, @rose]}, &(0x7f0000000300)=0x48, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x4, {0xa, 0x4e21, 0x2, @mcast2, 0x9c}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000180), r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0xfffffffe}}, 0x10) 13:25:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote, 0x3}, r1}}, 0x30) 13:25:11 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async, rerun: 64) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x90) (rerun: 64) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e20, 0x4, @private0, 0x3}}}, 0x90) (async, rerun: 32) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000540)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x81, 0x20, 0x1f, 0x1, 0x6, 0x9, 0x74, 0x1}, r7}}, 0x120) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r8, 0xffffffe0}}, 0x10) 13:25:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x5, r1, 0x0, 0x0, 0x1}}, 0x20) 13:25:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x40380, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="20002dbd7000fbdbdf250900000008000500ff0700001400028008000800ff0f00000800070001800000080005000080000008000500010000000800060000080000"], 0x48}, 0x1, 0x0, 0x0, 0x40000080}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) 13:25:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x5, r1, 0x0, 0x0, 0x1}}, 0x20) 13:25:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) (async, rerun: 64) accept4$ax25(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @null}, [@bcast, @default, @null, @null, @rose, @remote, @rose]}, &(0x7f0000000300)=0x48, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x4, {0xa, 0x4e21, 0x2, @mcast2, 0x9c}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000180), r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0xfffffffe}}, 0x10) 13:25:11 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) bind$vsock_dgram(r0, &(0x7f0000000240)={0x28, 0x0, 0xffffffff, @local}, 0x10) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="300026bd7000fddbdf2508000000240003800800010000000000080001000100000008000500ac141433060007004e220000"], 0x38}, 0x1, 0x0, 0x0, 0x185}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000280)={0x0, 0x401, 0x88, 0x0, 0x1}) socketpair(0x2a, 0x5, 0x2, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), r0) sendmsg$ETHTOOL_MSG_WOL_SET(r3, &(0x7f0000000740)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000380)={0x358, r4, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_SOPASS={0xf4, 0x3, "50a786b176e35d7863f391219fb4c98ff1dbad723751233b5c6cad5cd4c99b43b3564f370d45f1fdf24edaad2dda35bbb1d4afc5eead4606e3e1b122b6edc53a91b2925cf65db896f4a1962aec8dbedc7e53b80f8d3a8d48dded1ce8ce055e7fa8597cb318b15f28bea2f3bc582b0c562a0803112333e85cb8e99d72e56c18243ce82e9e80a11b929ea26cdfc6ef70009cc71728d683f9d7ad87b224dd693e9d4e38159d7c5260882484c70f1bd6ce81004169bb12bba910fcceee57ed03e3933cfdfda40f62235bfa3462feb64ac3b031fe76373e086c2eb88be2ceb6610730ce4ba9f8d62e10d0cb59e81e3a084cbf"}, @ETHTOOL_A_WOL_MODES={0x17c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000}, @ETHTOOL_A_BITSET_BITS={0x170, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\'!+.\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x80, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x743}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '$.\x00'}]}]}]}, @ETHTOOL_A_WOL_SOPASS={0xc2, 0x3, "46c07c84cc3a8cd6b765d6c334aab4273eb50e1fb0a0efabb93122aae23b43b79381828f274d9f020a1aa20a718d56b97015ceadec688068ede47b711a123879b1b3a5a5c78832615c257afb01bf676c9ed79533eeeb37076a15b401faf7910abcc0852bc8a4fe22f405040a6847d699986599f5c530233677f9ace51623a6c369b5dc0d5f0824a0fd662c5e0ccd80d43f31db8f6457d39cb2896c3a5e0846cd40acd1b11851f09fe099abe1a0b22ee4ad38f6bc974b741b244fb8cae5ba"}, @ETHTOOL_A_WOL_MODES={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_WOL_MODES={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x358}, 0x1, 0x0, 0x0, 0x44040}, 0x20088d0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$tun(r0, &(0x7f0000000780)={@void, @val={0x2, 0x0, 0x0, 0x1f, 0x400, 0x3}, @eth={@remote, @empty, @void, {@llc_tr={0x11, {@snap={0x0, 0xaa, 'dx', "52a21a", 0x1, "c8b6d90d561540a954c1a263800ce739271ffc29491e013bbd3d178c3f403de65b80bbe97d38daea69b162b106782c91e20c8e614e8a0a05b3746b33783f7f7287"}}}}}}, 0x62) 13:25:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x5, r1, 0x0, 0x0, 0x1}}, 0x20) 13:25:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0x40380, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r4, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="20002dbd7000fbdbdf250900000008000500ff0700001400028008000800ff0f00000800070001800000080005000080000008000500010000000800060000080000"], 0x48}, 0x1, 0x0, 0x0, 0x40000080}, 0x10) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) 13:25:11 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) (async) bind$vsock_dgram(r0, &(0x7f0000000240)={0x28, 0x0, 0xffffffff, @local}, 0x10) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="300026bd7000fddbdf2508000000240003800800010000000000080001000100000008000500ac141433060007004e220000"], 0x38}, 0x1, 0x0, 0x0, 0x185}, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) (async) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000280)={0x0, 0x401, 0x88, 0x0, 0x1}) socketpair(0x2a, 0x5, 0x2, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), r0) sendmsg$ETHTOOL_MSG_WOL_SET(r3, &(0x7f0000000740)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000380)={0x358, r4, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_SOPASS={0xf4, 0x3, "50a786b176e35d7863f391219fb4c98ff1dbad723751233b5c6cad5cd4c99b43b3564f370d45f1fdf24edaad2dda35bbb1d4afc5eead4606e3e1b122b6edc53a91b2925cf65db896f4a1962aec8dbedc7e53b80f8d3a8d48dded1ce8ce055e7fa8597cb318b15f28bea2f3bc582b0c562a0803112333e85cb8e99d72e56c18243ce82e9e80a11b929ea26cdfc6ef70009cc71728d683f9d7ad87b224dd693e9d4e38159d7c5260882484c70f1bd6ce81004169bb12bba910fcceee57ed03e3933cfdfda40f62235bfa3462feb64ac3b031fe76373e086c2eb88be2ceb6610730ce4ba9f8d62e10d0cb59e81e3a084cbf"}, @ETHTOOL_A_WOL_MODES={0x17c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000}, @ETHTOOL_A_BITSET_BITS={0x170, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\'!+.\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x80, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x743}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '$.\x00'}]}]}]}, @ETHTOOL_A_WOL_SOPASS={0xc2, 0x3, "46c07c84cc3a8cd6b765d6c334aab4273eb50e1fb0a0efabb93122aae23b43b79381828f274d9f020a1aa20a718d56b97015ceadec688068ede47b711a123879b1b3a5a5c78832615c257afb01bf676c9ed79533eeeb37076a15b401faf7910abcc0852bc8a4fe22f405040a6847d699986599f5c530233677f9ace51623a6c369b5dc0d5f0824a0fd662c5e0ccd80d43f31db8f6457d39cb2896c3a5e0846cd40acd1b11851f09fe099abe1a0b22ee4ad38f6bc974b741b244fb8cae5ba"}, @ETHTOOL_A_WOL_MODES={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_WOL_MODES={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x358}, 0x1, 0x0, 0x0, 0x44040}, 0x20088d0) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) write$tun(r0, &(0x7f0000000780)={@void, @val={0x2, 0x0, 0x0, 0x1f, 0x400, 0x3}, @eth={@remote, @empty, @void, {@llc_tr={0x11, {@snap={0x0, 0xaa, 'dx', "52a21a", 0x1, "c8b6d90d561540a954c1a263800ce739271ffc29491e013bbd3d178c3f403de65b80bbe97d38daea69b162b106782c91e20c8e614e8a0a05b3746b33783f7f7287"}}}}}}, 0x62) 13:25:11 executing program 4: accept$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @null}, [@netrom, @bcast, @bcast, @default, @netrom, @netrom, @bcast, @rose]}, &(0x7f00000000c0)=0x48) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:11 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x90) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e20, 0x4, @private0, 0x3}}}, 0x90) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000540)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "aa6ee36ddb399912a2a7ca8d12849c560e646e643a0d481160b49c23cff5a5bf4c5e6b1bfd44f0062afd39ff28ca912fdefaf9a0f415a85838c0c1cfe2b5568a38450793327ffd43bc590e543725f627df3f6420dcd2285d71748ad5d774ce0494da826525cc66a20aaab437bee48b03f8ef977d6107a2c17250e729b9630fc706102c1fe0ef63302a3106f18eb39b69016bc20db1da66bed220213ccead992af27ad71a209f66e26fede02ab9ec3d000c60f8356f5e70a906c06652d4b160397512d575fd36d3b7926fefbc5f91e157b2979b1ca6f4883e0c6c73e650c9c295f8511c833da23cacb55e986bfb36d63d3201d0e22ca0f6517c7798e122f53dd2", 0x81, 0x20, 0x1f, 0x1, 0x6, 0x9, 0x74, 0x1}, r7}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r8, 0xffffffe0}}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000500), 0x0, 0x6}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x90) (async) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) (async) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e20, 0x4, @private0, 0x3}}}, 0x90) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000540)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140), 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r6, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x1, 0x0, "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", 0x81, 0x20, 0x1f, 0x1, 0x6, 0x9, 0x74, 0x1}, r7}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x2, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r8, 0xffffffe0}}, 0x10) (async) 13:25:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) (async) accept4$ax25(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @null}, [@bcast, @default, @null, @null, @rose, @remote, @rose]}, &(0x7f0000000300)=0x48, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x4, {0xa, 0x4e21, 0x2, @mcast2, 0x9c}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000180), r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r3, 0xfffffffe}}, 0x10) 13:25:11 executing program 4: accept$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @null}, [@netrom, @bcast, @bcast, @default, @netrom, @netrom, @bcast, @rose]}, &(0x7f00000000c0)=0x48) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:11 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000e00), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) (async) bind$vsock_dgram(r0, &(0x7f0000000240)={0x28, 0x0, 0xffffffff, @local}, 0x10) (async) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="300026bd7000fddbdf2508000000240003800800010000000000080001000100000008000500ac141433060007004e220000"], 0x38}, 0x1, 0x0, 0x0, 0x185}, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r2}}, 0x30) (async) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000280)={0x0, 0x401, 0x88, 0x0, 0x1}) socketpair(0x2a, 0x5, 0x2, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), r0) sendmsg$ETHTOOL_MSG_WOL_SET(r3, &(0x7f0000000740)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000380)={0x358, r4, 0x10, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_WOL_SOPASS={0xf4, 0x3, "50a786b176e35d7863f391219fb4c98ff1dbad723751233b5c6cad5cd4c99b43b3564f370d45f1fdf24edaad2dda35bbb1d4afc5eead4606e3e1b122b6edc53a91b2925cf65db896f4a1962aec8dbedc7e53b80f8d3a8d48dded1ce8ce055e7fa8597cb318b15f28bea2f3bc582b0c562a0803112333e85cb8e99d72e56c18243ce82e9e80a11b929ea26cdfc6ef70009cc71728d683f9d7ad87b224dd693e9d4e38159d7c5260882484c70f1bd6ce81004169bb12bba910fcceee57ed03e3933cfdfda40f62235bfa3462feb64ac3b031fe76373e086c2eb88be2ceb6610730ce4ba9f8d62e10d0cb59e81e3a084cbf"}, @ETHTOOL_A_WOL_MODES={0x17c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x40000}, @ETHTOOL_A_BITSET_BITS={0x170, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-:\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\'!+.\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x80, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x743}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '/dev/dlm_plock\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_NAME={0x1c, 0x2, '/dev/infiniband/rdma_cm\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '$.\x00'}]}]}]}, @ETHTOOL_A_WOL_SOPASS={0xc2, 0x3, "46c07c84cc3a8cd6b765d6c334aab4273eb50e1fb0a0efabb93122aae23b43b79381828f274d9f020a1aa20a718d56b97015ceadec688068ede47b711a123879b1b3a5a5c78832615c257afb01bf676c9ed79533eeeb37076a15b401faf7910abcc0852bc8a4fe22f405040a6847d699986599f5c530233677f9ace51623a6c369b5dc0d5f0824a0fd662c5e0ccd80d43f31db8f6457d39cb2896c3a5e0846cd40acd1b11851f09fe099abe1a0b22ee4ad38f6bc974b741b244fb8cae5ba"}, @ETHTOOL_A_WOL_MODES={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_WOL_MODES={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x358}, 0x1, 0x0, 0x0, 0x44040}, 0x20088d0) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) write$tun(r0, &(0x7f0000000780)={@void, @val={0x2, 0x0, 0x0, 0x1f, 0x400, 0x3}, @eth={@remote, @empty, @void, {@llc_tr={0x11, {@snap={0x0, 0xaa, 'dx', "52a21a", 0x1, "c8b6d90d561540a954c1a263800ce739271ffc29491e013bbd3d178c3f403de65b80bbe97d38daea69b162b106782c91e20c8e614e8a0a05b3746b33783f7f7287"}}}}}}, 0x62) 13:25:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x200000000000, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 4: accept$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @null}, [@netrom, @bcast, @bcast, @default, @netrom, @netrom, @bcast, @rose]}, &(0x7f00000000c0)=0x48) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:11 executing program 5: accept$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @null}, [@netrom, @bcast, @bcast, @default, @netrom, @netrom, @bcast, @rose]}, &(0x7f00000000c0)=0x48) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x200000000000, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x200000000000, &(0x7f0000000040), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 13:25:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r1, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xc0, r1, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macvlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xb98ce8bd1480f2d7, 0x1}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x57}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000}, 0x8094) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) 13:25:11 executing program 1: sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x78, 0x0, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x2, 0x4, 0xffffffff, 0x3f, 0x3ff]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x4, 0x3, 0x4]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xab}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x6}]}, 0x78}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2, 0xdb82}, r1}}, 0x30) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(0xffffffffffffffff, 0x800442d4, &(0x7f00000004c0)=0x10000) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f00000002c0), 0x4, {0xa, 0x4e22, 0x3ff, @remote, 0xffffffb7}, r1}}, 0x38) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380), 0xffffffffffffffff) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r5, 0x29, 0x0, 0x8, 0x9, 0x28, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x80, 0x7800, 0x7, 0x6}}) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x60, r3, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xd1e}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x10000}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x4048800}, 0x40) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x200000000000, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @mcast2, 0xdb82}, r1}}, 0x30) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (rerun: 32) 13:25:11 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"25d1f420bbd205072f70ba7d47d3b5c4"}}}}, 0x90) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000040)={0x9, 0x108, 0xfa00, {r3, 0xff, "54a2e3", "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"}}, 0x110) 13:25:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @mcast2}, r1}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 13:25:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r1, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xc0, r1, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macvlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xb98ce8bd1480f2d7, 0x1}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x57}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000}, 0x8094) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r1, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) (async) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xc0, r1, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macvlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xb98ce8bd1480f2d7, 0x1}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x57}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000}, 0x8094) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) (async) [ 879.009940] ================================================================== [ 879.017475] BUG: KASAN: use-after-free in __list_del_entry_valid+0xe0/0xf0 [ 879.024477] Read of size 8 at addr ffff8880997d9858 by task syz-executor.5/28428 [ 879.031989] [ 879.033610] CPU: 0 PID: 28428 Comm: syz-executor.5 Not tainted 4.14.298-syzkaller #0 [ 879.041462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 879.050793] Call Trace: [ 879.053370] dump_stack+0x1b2/0x281 13:25:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r1, 0x922ccde0b47989f9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_FLAGS={0xc}]}]}, 0x2c}}, 0x0) (async) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xc0, r1, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fffffff}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macvlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010102}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xb98ce8bd1480f2d7, 0x1}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x57}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000}, 0x8094) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000340), 0xffffffffffffffff, 0x0, 0x2, 0xfffffffffffffefb}}, 0x20) [ 879.056988] print_address_description.cold+0x54/0x1d3 [ 879.062246] kasan_report_error.cold+0x8a/0x191 [ 879.066896] ? __list_del_entry_valid+0xe0/0xf0 [ 879.071548] __asan_report_load8_noabort+0x68/0x70 [ 879.076471] ? lock_acquire+0x100/0x3f0 [ 879.080437] ? __list_del_entry_valid+0xe0/0xf0 [ 879.085100] __list_del_entry_valid+0xe0/0xf0 [ 879.089591] cma_cancel_operation+0x285/0x950 [ 879.096692] rdma_destroy_id+0x84/0xb60 [ 879.100652] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 879.105744] ucma_close+0x11a/0x340 13:25:12 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0xc4a01, 0x0) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000080)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x1e, 0x0, [0x7, 0x3ff, 0x1f, 0xffff8384, 0x0, 0x5, 0x3, 0xff, 0x3ff, 0x0, 0x10001, 0x1, 0x400, 0x6, 0x0, 0x2]}, {0x1d, 0x0, [0x3f, 0x2, 0x9, 0x7fff, 0xfffffffb, 0x2, 0xd98, 0x80000000, 0x10000, 0x6, 0x2, 0x6, 0xf1c, 0xfffffffa, 0x7, 0x80000001]}, {0x4, 0x0, [0x20bc7c45, 0x0, 0x81, 0x80, 0x40, 0x15, 0x0, 0x2eb, 0x2, 0xfffffe01, 0x100, 0x7, 0x80, 0x7, 0xf1e, 0x200]}, {0x23, 0x0, [0xa1, 0x100, 0x4, 0x5, 0x4, 0x3ff, 0x1ff, 0x800, 0x10000, 0x6, 0x4, 0x3, 0x7, 0x9, 0xfffffffa, 0x8001]}, {0x2c, 0x0, [0x1, 0x40, 0x0, 0xb1cf, 0x88, 0xfffffff9, 0x3, 0x0, 0x1ff, 0x8b37, 0x5, 0x0, 0x800, 0x0, 0x0, 0x81]}, {0x20, 0x0, [0x20, 0x80, 0x6, 0x4, 0x8, 0x6, 0xb0ba, 0x8, 0x4, 0x8, 0x6, 0x20, 0x7f, 0x100, 0x4, 0x2]}, {0x8, 0x0, [0x1, 0xe5, 0x2, 0xff2, 0xf2, 0x2, 0x10001, 0x1, 0x7, 0xfffffffe, 0xa2f8, 0x9, 0xff, 0x6, 0x4, 0x1f]}], 0xffffffffffffffff, 0x1, 0x1, 0x1f8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x4, {0xa, 0x4e23, 0x7ff, @dev={0xfe, 0x80, '\x00', 0x21}, 0x1e5}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) [ 879.109351] ? ima_file_free+0x4f/0x330 [ 879.113306] ? ucma_query_addr+0x320/0x320 [ 879.117558] __fput+0x25f/0x7a0 [ 879.120827] task_work_run+0x11f/0x190 [ 879.124711] exit_to_usermode_loop+0x1ad/0x200 [ 879.129292] do_syscall_64+0x4a3/0x640 [ 879.133219] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 879.138448] [ 879.140069] Allocated by task 28434: [ 879.143774] kasan_kmalloc+0xeb/0x160 [ 879.147569] kmem_cache_alloc_trace+0x131/0x3d0 [ 879.152220] rdma_create_id+0x57/0x4c0 [ 879.156359] ucma_create_id+0x18b/0x500 13:25:12 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0xc4a01, 0x0) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000080)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x1e, 0x0, [0x7, 0x3ff, 0x1f, 0xffff8384, 0x0, 0x5, 0x3, 0xff, 0x3ff, 0x0, 0x10001, 0x1, 0x400, 0x6, 0x0, 0x2]}, {0x1d, 0x0, [0x3f, 0x2, 0x9, 0x7fff, 0xfffffffb, 0x2, 0xd98, 0x80000000, 0x10000, 0x6, 0x2, 0x6, 0xf1c, 0xfffffffa, 0x7, 0x80000001]}, {0x4, 0x0, [0x20bc7c45, 0x0, 0x81, 0x80, 0x40, 0x15, 0x0, 0x2eb, 0x2, 0xfffffe01, 0x100, 0x7, 0x80, 0x7, 0xf1e, 0x200]}, {0x23, 0x0, [0xa1, 0x100, 0x4, 0x5, 0x4, 0x3ff, 0x1ff, 0x800, 0x10000, 0x6, 0x4, 0x3, 0x7, 0x9, 0xfffffffa, 0x8001]}, {0x2c, 0x0, [0x1, 0x40, 0x0, 0xb1cf, 0x88, 0xfffffff9, 0x3, 0x0, 0x1ff, 0x8b37, 0x5, 0x0, 0x800, 0x0, 0x0, 0x81]}, {0x20, 0x0, [0x20, 0x80, 0x6, 0x4, 0x8, 0x6, 0xb0ba, 0x8, 0x4, 0x8, 0x6, 0x20, 0x7f, 0x100, 0x4, 0x2]}, {0x8, 0x0, [0x1, 0xe5, 0x2, 0xff2, 0xf2, 0x2, 0x10001, 0x1, 0x7, 0xfffffffe, 0xa2f8, 0x9, 0xff, 0x6, 0x4, 0x1f]}], 0xffffffffffffffff, 0x1, 0x1, 0x1f8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x4, {0xa, 0x4e23, 0x7ff, @dev={0xfe, 0x80, '\x00', 0x21}, 0x1e5}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0xc4a01, 0x0) (async) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000080)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x1e, 0x0, [0x7, 0x3ff, 0x1f, 0xffff8384, 0x0, 0x5, 0x3, 0xff, 0x3ff, 0x0, 0x10001, 0x1, 0x400, 0x6, 0x0, 0x2]}, {0x1d, 0x0, [0x3f, 0x2, 0x9, 0x7fff, 0xfffffffb, 0x2, 0xd98, 0x80000000, 0x10000, 0x6, 0x2, 0x6, 0xf1c, 0xfffffffa, 0x7, 0x80000001]}, {0x4, 0x0, [0x20bc7c45, 0x0, 0x81, 0x80, 0x40, 0x15, 0x0, 0x2eb, 0x2, 0xfffffe01, 0x100, 0x7, 0x80, 0x7, 0xf1e, 0x200]}, {0x23, 0x0, [0xa1, 0x100, 0x4, 0x5, 0x4, 0x3ff, 0x1ff, 0x800, 0x10000, 0x6, 0x4, 0x3, 0x7, 0x9, 0xfffffffa, 0x8001]}, {0x2c, 0x0, [0x1, 0x40, 0x0, 0xb1cf, 0x88, 0xfffffff9, 0x3, 0x0, 0x1ff, 0x8b37, 0x5, 0x0, 0x800, 0x0, 0x0, 0x81]}, {0x20, 0x0, [0x20, 0x80, 0x6, 0x4, 0x8, 0x6, 0xb0ba, 0x8, 0x4, 0x8, 0x6, 0x20, 0x7f, 0x100, 0x4, 0x2]}, {0x8, 0x0, [0x1, 0xe5, 0x2, 0xff2, 0xf2, 0x2, 0x10001, 0x1, 0x7, 0xfffffffe, 0xa2f8, 0x9, 0xff, 0x6, 0x4, 0x1f]}], 0xffffffffffffffff, 0x1, 0x1, 0x1f8}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x4, {0xa, 0x4e23, 0x7ff, @dev={0xfe, 0x80, '\x00', 0x21}, 0x1e5}}}, 0x38) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) (async) [ 879.160311] ucma_write+0x206/0x2c0 [ 879.163919] __vfs_write+0xe4/0x630 [ 879.167550] vfs_write+0x17f/0x4d0 [ 879.171082] SyS_write+0xf2/0x210 [ 879.174529] do_syscall_64+0x1d5/0x640 [ 879.178408] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 879.183584] [ 879.185198] Freed by task 28427: [ 879.188554] kasan_slab_free+0xc3/0x1a0 [ 879.192653] kfree+0xc9/0x250 [ 879.195868] ucma_close+0x11a/0x340 [ 879.199639] __fput+0x25f/0x7a0 [ 879.203000] task_work_run+0x11f/0x190 13:25:12 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0xc4a01, 0x0) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000080)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x1e, 0x0, [0x7, 0x3ff, 0x1f, 0xffff8384, 0x0, 0x5, 0x3, 0xff, 0x3ff, 0x0, 0x10001, 0x1, 0x400, 0x6, 0x0, 0x2]}, {0x1d, 0x0, [0x3f, 0x2, 0x9, 0x7fff, 0xfffffffb, 0x2, 0xd98, 0x80000000, 0x10000, 0x6, 0x2, 0x6, 0xf1c, 0xfffffffa, 0x7, 0x80000001]}, {0x4, 0x0, [0x20bc7c45, 0x0, 0x81, 0x80, 0x40, 0x15, 0x0, 0x2eb, 0x2, 0xfffffe01, 0x100, 0x7, 0x80, 0x7, 0xf1e, 0x200]}, {0x23, 0x0, [0xa1, 0x100, 0x4, 0x5, 0x4, 0x3ff, 0x1ff, 0x800, 0x10000, 0x6, 0x4, 0x3, 0x7, 0x9, 0xfffffffa, 0x8001]}, {0x2c, 0x0, [0x1, 0x40, 0x0, 0xb1cf, 0x88, 0xfffffff9, 0x3, 0x0, 0x1ff, 0x8b37, 0x5, 0x0, 0x800, 0x0, 0x0, 0x81]}, {0x20, 0x0, [0x20, 0x80, 0x6, 0x4, 0x8, 0x6, 0xb0ba, 0x8, 0x4, 0x8, 0x6, 0x20, 0x7f, 0x100, 0x4, 0x2]}, {0x8, 0x0, [0x1, 0xe5, 0x2, 0xff2, 0xf2, 0x2, 0x10001, 0x1, 0x7, 0xfffffffe, 0xa2f8, 0x9, 0xff, 0x6, 0x4, 0x1f]}], 0xffffffffffffffff, 0x1, 0x1, 0x1f8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x4, {0xa, 0x4e23, 0x7ff, @dev={0xfe, 0x80, '\x00', 0x21}, 0x1e5}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040), 0xc4a01, 0x0) (async) ioctl$UFFDIO_WRITEPROTECT(r0, 0xc018aa06, &(0x7f0000000080)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x1e, 0x0, [0x7, 0x3ff, 0x1f, 0xffff8384, 0x0, 0x5, 0x3, 0xff, 0x3ff, 0x0, 0x10001, 0x1, 0x400, 0x6, 0x0, 0x2]}, {0x1d, 0x0, [0x3f, 0x2, 0x9, 0x7fff, 0xfffffffb, 0x2, 0xd98, 0x80000000, 0x10000, 0x6, 0x2, 0x6, 0xf1c, 0xfffffffa, 0x7, 0x80000001]}, {0x4, 0x0, [0x20bc7c45, 0x0, 0x81, 0x80, 0x40, 0x15, 0x0, 0x2eb, 0x2, 0xfffffe01, 0x100, 0x7, 0x80, 0x7, 0xf1e, 0x200]}, {0x23, 0x0, [0xa1, 0x100, 0x4, 0x5, 0x4, 0x3ff, 0x1ff, 0x800, 0x10000, 0x6, 0x4, 0x3, 0x7, 0x9, 0xfffffffa, 0x8001]}, {0x2c, 0x0, [0x1, 0x40, 0x0, 0xb1cf, 0x88, 0xfffffff9, 0x3, 0x0, 0x1ff, 0x8b37, 0x5, 0x0, 0x800, 0x0, 0x0, 0x81]}, {0x20, 0x0, [0x20, 0x80, 0x6, 0x4, 0x8, 0x6, 0xb0ba, 0x8, 0x4, 0x8, 0x6, 0x20, 0x7f, 0x100, 0x4, 0x2]}, {0x8, 0x0, [0x1, 0xe5, 0x2, 0xff2, 0xf2, 0x2, 0x10001, 0x1, 0x7, 0xfffffffe, 0xa2f8, 0x9, 0xff, 0x6, 0x4, 0x1f]}], 0xffffffffffffffff, 0x1, 0x1, 0x1f8}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x4, {0xa, 0x4e23, 0x7ff, @dev={0xfe, 0x80, '\x00', 0x21}, 0x1e5}}}, 0x38) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000180)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) (async) [ 879.206978] exit_to_usermode_loop+0x1ad/0x200 [ 879.211741] do_syscall_64+0x4a3/0x640 [ 879.215647] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 879.220911] [ 879.222528] The buggy address belongs to the object at ffff8880997d9680 [ 879.222528] which belongs to the cache kmalloc-1024 of size 1024 [ 879.235362] The buggy address is located 472 bytes inside of [ 879.235362] 1024-byte region [ffff8880997d9680, ffff8880997d9a80) [ 879.247440] The buggy address belongs to the page: 13:25:12 executing program 4: socket$nl_route(0x10, 0x3, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x640080c4}, 0x1) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 13:25:12 executing program 4: socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x200, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x640080c4}, 0x1) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 879.252357] page:ffffea000265f600 count:1 mapcount:0 mapping:ffff8880997d8000 index:0x0 compound_mapcount: 0 [ 879.262424] flags: 0xfff00000008100(slab|head) [ 879.267007] raw: 00fff00000008100 ffff8880997d8000 0000000000000000 0000000100000007 [ 879.274886] raw: ffffea00026dafa0 ffffea00024b1820 ffff88813fe74ac0 0000000000000000 [ 879.282757] page dumped because: kasan: bad access detected [ 879.288486] [ 879.290098] Memory state around the buggy address: [ 879.295024] ffff8880997d9700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 879.302380] ffff8880997d9780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 879.309731] >ffff8880997d9800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 879.317078] ^ [ 879.323314] ffff8880997d9880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 879.330664] ffff8880997d9900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 879.338000] ================================================================== [ 879.345422] Disabling lock debugging due to kernel taint [ 879.353811] Kernel panic - not syncing: panic_on_warn set ... [ 879.353811] [ 879.361270] CPU: 0 PID: 28428 Comm: syz-executor.5 Tainted: G B 4.14.298-syzkaller #0 [ 879.370351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 879.379783] Call Trace: [ 879.382365] dump_stack+0x1b2/0x281 [ 879.385991] panic+0x1f9/0x42d [ 879.389437] ? add_taint.cold+0x16/0x16 [ 879.393411] ? ___preempt_schedule+0x16/0x18 [ 879.397896] kasan_end_report+0x43/0x49 [ 879.401848] kasan_report_error.cold+0xa7/0x191 [ 879.406495] ? __list_del_entry_valid+0xe0/0xf0 [ 879.411139] __asan_report_load8_noabort+0x68/0x70 [ 879.416051] ? lock_acquire+0x100/0x3f0 [ 879.420027] ? __list_del_entry_valid+0xe0/0xf0 [ 879.424676] __list_del_entry_valid+0xe0/0xf0 [ 879.429160] cma_cancel_operation+0x285/0x950 [ 879.433719] rdma_destroy_id+0x84/0xb60 [ 879.437686] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 879.442770] ucma_close+0x11a/0x340 [ 879.446382] ? ima_file_free+0x4f/0x330 [ 879.450334] ? ucma_query_addr+0x320/0x320 [ 879.454664] __fput+0x25f/0x7a0 [ 879.457927] task_work_run+0x11f/0x190 [ 879.461791] exit_to_usermode_loop+0x1ad/0x200 [ 879.466350] do_syscall_64+0x4a3/0x640 [ 879.470350] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 879.475864] Kernel Offset: disabled [ 879.479484] Rebooting in 86400 seconds..