M_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000580)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {&(0x7f0000000540), r8}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000400)={0x15, 0x110, 0xfa00, {r1, 0x3ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x400, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}, @in={0x2, 0x4e24, @loopback}}}, 0x118) (async) syz_open_dev$loop(&(0x7f00000003c0), 0x100000001, 0x940) (async) ioctl$LOOP_SET_CAPACITY(r5, 0x4c07) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000180)={'erspan0\x00', 0x0, 0x1, 0x10, 0x3, 0x2, {{0x14, 0x4, 0x3, 0x37, 0x50, 0x67, 0x0, 0x0, 0x2f, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0xc}, {[@ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x1c, 0x28, 0x3, 0x8, [{@loopback, 0xfffffffb}, {@broadcast, 0x401}, {@remote, 0x200}]}, @rr={0x7, 0x1b, 0xde, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @empty, @empty]}]}}}}}) (async) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002bbd7000fedbdf250500000008000600", @ANYRES32=r6, @ANYBLOB="0c003900060000007790ec94050033000200000008002b00060000000e002800000008002b00050000000800390002ff65483ba16af31ba58cff03000000000000b3689f2c486d728f2e8c59678d4bc8c233a05acd4a36e91569748e5b187888e21b3fad31f8213f839c3601085e8cedfcafc23cbd16159e979ff36fd3adf236491880713c8a388153207546167102"], 0x4c}}, 0x4000800) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000580), 0x106, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {&(0x7f0000000540), r8}}, 0x18) (async) 00:37:32 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x6, @private2, 0x3}, r1}}, 0x30) 00:37:32 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x80000001, @empty, 0x5}, {0xa, 0x4e20, 0x7, @private0, 0x1f}, r1, 0xffffff01}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x6, @private2, 0x3}, r1}}, 0x30) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x80000001, @empty, 0x5}, {0xa, 0x4e20, 0x7, @private0, 0x1f}, r1, 0xffffff01}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000000)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x3ff, @mcast1, 0x2}, @in6={0xa, 0x4e21, 0x6, @rand_addr=' \x01\x00', 0x6e47}}}, 0x118) 00:37:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000400)={0x15, 0x110, 0xfa00, {r1, 0x3ff, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x400, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3}, @in={0x2, 0x4e24, @loopback}}}, 0x118) (async) r5 = syz_open_dev$loop(&(0x7f00000003c0), 0x100000001, 0x940) ioctl$LOOP_SET_CAPACITY(r5, 0x4c07) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000180)={'erspan0\x00', 0x0, 0x1, 0x10, 0x3, 0x2, {{0x14, 0x4, 0x3, 0x37, 0x50, 0x67, 0x0, 0x0, 0x2f, 0x0, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0xc}, {[@ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x1c, 0x28, 0x3, 0x8, [{@loopback, 0xfffffffb}, {@broadcast, 0x401}, {@remote, 0x200}]}, @rr={0x7, 0x1b, 0xde, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @empty, @empty]}]}}}}}) sendmsg$BATADV_CMD_GET_HARDIF(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="02002bbd7000fedbdf250500000008000600", @ANYRES32=r6, @ANYBLOB="0c003900060000007790ec94050033000200000008002b00060000000e002800000008002b00050000000800390002ff65483ba16af31ba58cff03000000000000b3689f2c486d728f2e8c59678d4bc8c233a05acd4a36e91569748e5b187888e21b3fad31f8213f839c3601085e8cedfcafc23cbd16159e979ff36fd3adf236491880713c8a388153207546167102"], 0x4c}}, 0x4000800) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000580)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000600)={0x1, 0x10, 0xfa00, {&(0x7f0000000540), r8}}, 0x18) 00:37:33 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x4000020, @loopback}, r1}}, 0xfffffffffffffe73) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111, 0x1}}, 0x20) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x5}, {0xa, 0x4e20, 0x7, @private0, 0x1f}, r1, 0xffffff01}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000000)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x3ff, @mcast1, 0x2}, @in6={0xa, 0x4e21, 0x6, @rand_addr=' \x01\x00', 0x6e47}}}, 0x118) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000000)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x3ff, @mcast1, 0x2}, @in6={0xa, 0x4e21, 0x6, @rand_addr=' \x01\x00', 0x6e47}}}, 0x118) (async) 00:37:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x6, @private2, 0x3}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x6, @private2, 0x3}, r1}}, 0x30) (async) 00:37:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, 0x0, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x0, 0x2, "d6ed388e7c66d4a8501dbd75dd2a6ab3cf8a080678cbb950e1fc792f46f3a6985c2bbb423abfb50458c1d450ffcfa77d3f4ffb06f1a715af5d8bb1a4569203af4bec2c259d4f352a17856a2bb7b5efb1afb7a016ce3c104cf4e1f9d0d3b02fa31895b14f7d7a777b728e9c8c9a2788603638884e344dbdc398509b37c49b10c7e9c6c420ae02b58c93c2e992d16fff0e1360861fd2b2a611d927ea29492e8c430af82776800eae4398bb07c554c3fe145567eae59ae60fc99968d207d378ace81f6db1cdddeefd7ea16735f4e4d7e15bce2623dc3547cd5cd05cfc9ca17c2f6d2c1c4edb56b26ba18ead64ac6ab79ce041bd37abca97180fb892af490db23526", 0x80, 0x8, 0x3, 0x3, 0xd6, 0x1f, 0x5f}, r2}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x0, 0x2, "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", 0x80, 0x8, 0x3, 0x3, 0xd6, 0x1f, 0x5f}, r2}}, 0x120) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:33 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x4000020, @loopback}, r1}}, 0xfffffffffffffe73) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111, 0x1}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x4000020, @loopback}, r1}}, 0xfffffffffffffe73) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111, 0x1}}, 0x20) (async) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x4e20, 0x7, @private0, 0x1f}, r1, 0xffffff01}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x0, 0x2, "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", 0x80, 0x8, 0x3, 0x3, 0xd6, 0x1f, 0x5f}, r2}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0x0, 0x2, "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", 0x80, 0x8, 0x3, 0x3, 0xd6, 0x1f, 0x5f}, r2}}, 0x120) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000000)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x3ff, @mcast1, 0x2}, @in6={0xa, 0x4e21, 0x6, @rand_addr=' \x01\x00', 0x6e47}}}, 0x118) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x7, @private0, 0x1f}, r1, 0xffffff01}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x4000020, @loopback}, r1}}, 0xfffffffffffffe73) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111, 0x1}}, 0x20) 00:37:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) socketpair(0x1a, 0x0, 0x0, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_DETACH(r2, 0x7aa, &(0x7f0000000040)={{@hyper, 0x2}, 0x0, 0x100}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r5, 0x4008af23, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, &(0x7f00000002c0)={{@my=0x1, 0x1}, @hyper, 0x2, 0x9, 0xff, 0x5, 0x5, 0x8, 0x2e28}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r1, 0x3}}, 0x10) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000100)={r6, r2, 0x7, 0x75, &(0x7f0000000080)="4e1331973144cefa213bbc14b621baa4289cb6108f6ddee087425f8dc4329729ec00e6a1d064f5b4e4345662c2a9e1d0c089695c1880cf75f6fe833308414aaa0093a1fe675c2cef4bcf4e3d62840c5bd4ac2dd97a4f365709aa66a0a8de19bb1855f6498e323d86b3e960dfcd5503137a4ba57e6c", 0x0, 0x81, 0x4, 0x1, 0x7, 0x2, 0x2, 'syz1\x00'}) 00:37:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x7}}, 0xff3f) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r7, 0x32}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000500)={0x15, 0x110, 0xfa00, {r8, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e20, 0x1, @empty, 0x6}}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r4, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r5}}, 0x48) 00:37:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, 0x0, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private0, 0x1f}, r1, 0xffffff01}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r2, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffd, 0x1, @remote, 0x6e9}, r1}}, 0x30) 00:37:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) socketpair(0x1a, 0x0, 0x0, 0x0) (async) ioctl$IOCTL_VMCI_QUEUEPAIR_DETACH(r2, 0x7aa, &(0x7f0000000040)={{@hyper, 0x2}, 0x0, 0x100}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r5, 0x4008af23, 0x0) (async) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, &(0x7f00000002c0)={{@my=0x1, 0x1}, @hyper, 0x2, 0x9, 0xff, 0x5, 0x5, 0x8, 0x2e28}) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r1, 0x3}}, 0x10) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, 0x0) (async) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000100)={r6, r2, 0x7, 0x75, &(0x7f0000000080)="4e1331973144cefa213bbc14b621baa4289cb6108f6ddee087425f8dc4329729ec00e6a1d064f5b4e4345662c2a9e1d0c089695c1880cf75f6fe833308414aaa0093a1fe675c2cef4bcf4e3d62840c5bd4ac2dd97a4f365709aa66a0a8de19bb1855f6498e323d86b3e960dfcd5503137a4ba57e6c", 0x0, 0x81, 0x4, 0x1, 0x7, 0x2, 0x2, 'syz1\x00'}) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private0}, r1, 0xffffff01}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r5}}, 0x48) 00:37:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) socketpair(0x1a, 0x0, 0x0, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_DETACH(r2, 0x7aa, &(0x7f0000000040)={{@hyper, 0x2}, 0x0, 0x100}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r5, 0x4008af23, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, &(0x7f00000002c0)={{@my=0x1, 0x1}, @hyper, 0x2, 0x9, 0xff, 0x5, 0x5, 0x8, 0x2e28}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r1, 0x3}}, 0x10) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000100)={r6, r2, 0x7, 0x75, &(0x7f0000000080)="4e1331973144cefa213bbc14b621baa4289cb6108f6ddee087425f8dc4329729ec00e6a1d064f5b4e4345662c2a9e1d0c089695c1880cf75f6fe833308414aaa0093a1fe675c2cef4bcf4e3d62840c5bd4ac2dd97a4f365709aa66a0a8de19bb1855f6498e323d86b3e960dfcd5503137a4ba57e6c", 0x0, 0x81, 0x4, 0x1, 0x7, 0x2, 0x2, 'syz1\x00'}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) (async) socketpair(0x1a, 0x0, 0x0, 0x0) (async) ioctl$IOCTL_VMCI_QUEUEPAIR_DETACH(r2, 0x7aa, &(0x7f0000000040)={{@hyper, 0x2}, 0x0, 0x100}) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r5, 0x4008af23, 0x0) (async) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, &(0x7f00000002c0)={{@my=0x1, 0x1}, @hyper, 0x2, 0x9, 0xff, 0x5, 0x5, 0x8, 0x2e28}) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r1, 0x3}}, 0x10) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000100)={r6, r2, 0x7, 0x75, &(0x7f0000000080)="4e1331973144cefa213bbc14b621baa4289cb6108f6ddee087425f8dc4329729ec00e6a1d064f5b4e4345662c2a9e1d0c089695c1880cf75f6fe833308414aaa0093a1fe675c2cef4bcf4e3d62840c5bd4ac2dd97a4f365709aa66a0a8de19bb1855f6498e323d86b3e960dfcd5503137a4ba57e6c", 0x0, 0x81, 0x4, 0x1, 0x7, 0x2, 0x2, 'syz1\x00'}) (async) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private0}, 0xffffffffffffffff, 0xffffff01}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r2, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) (async, rerun: 64) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffd, 0x1, @remote, 0x6e9}, r1}}, 0x30) 00:37:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x7}}, 0xff3f) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r7, 0x32}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000500)={0x15, 0x110, 0xfa00, {r8, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e20, 0x1, @empty, 0x6}}}, 0x118) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r4, 0xc}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f00000000c0), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x7}}, 0xff3f) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r7, 0x32}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000500)={0x15, 0x110, 0xfa00, {r8, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e20, 0x1, @empty, 0x6}}}, 0x118) (async) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r4, 0xc}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async, rerun: 32) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r5}}, 0x48) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private0}, 0xffffffffffffffff, 0xffffff01}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, 0x0, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r2, 0x6}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private0}, 0xffffffffffffffff, 0xffffff01}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private0}, r1}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x12, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, r0}}, 0x18) 00:37:33 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r2, 0x6}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:33 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private0}, r1}}, 0x48) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) 00:37:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0xfffffffffffffffd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x7}}, 0xff3f) (async, rerun: 64) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000180), r7, 0x32}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000500)={0x15, 0x110, 0xfa00, {r8, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e20, 0x1, @empty, 0x6}}}, 0x118) (async) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r4, 0xc}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r2, 0x6}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r2, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x4}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0xfffd, 0x1, @remote, 0x6e9}, r1}}, 0x30) 00:37:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, 0x0, 0x0) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {r3, 0x1ff, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x81, {"eea04b30a7729373c424a182de571661"}, 0x101, 0x99, 0x1}, @in6={0xa, 0x4e20, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) 00:37:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x1, {0xa, 0x4e24, 0x7fffffff, @rand_addr=' \x01\x00', 0x3}, r1}}, 0x38) 00:37:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) (async) 00:37:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x1, {0xa, 0x4e24, 0x7fffffff, @rand_addr=' \x01\x00', 0x3}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x1, {0xa, 0x4e24, 0x7fffffff, @rand_addr=' \x01\x00', 0x3}, r1}}, 0x38) (async) 00:37:34 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) (async) 00:37:34 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {r3, 0x1ff, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x81, {"eea04b30a7729373c424a182de571661"}, 0x101, 0x99, 0x1}, @in6={0xa, 0x4e20, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {r3, 0x1ff, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x81, {"eea04b30a7729373c424a182de571661"}, 0x101, 0x99, 0x1}, @in6={0xa, 0x4e20, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) (async) 00:37:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x20000000}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:34 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x29}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000004}, 0x10) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x1, {0xa, 0x4e24, 0x7fffffff, @rand_addr=' \x01\x00', 0x3}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x1, {0xa, 0x4e24, 0x7fffffff, @rand_addr=' \x01\x00', 0x3}, r1}}, 0x38) (async) 00:37:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x20000000}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x20000000}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:34 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:34 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x29}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000004}, 0x10) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {r3, 0x1ff, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x81, {"eea04b30a7729373c424a182de571661"}, 0x101, 0x99, 0x1}, @in6={0xa, 0x4e20, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x20}}}, 0x118) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r5}}, 0x48) 00:37:35 executing program 3: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x29}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000004}, 0x10) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @private2={0xfc, 0x2, '\x00', 0x1}}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x29}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000004}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) 00:37:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x20000000}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x0, {0x2, 0x5, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$vmci(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), r9, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r10, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x2, {0xa, 0x4e20, 0x5, @mcast2, 0xffff8001}, r1}}, 0x38) 00:37:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x113, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x40, @ipv4={'\x00', '\xff\xff', @local}, 0x8}, {0xa, 0x4e23, 0x8000, @empty, 0x1}, r2, 0xff}}, 0x48) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r4, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast2}, @ib={0x1b, 0x200, 0x7, {"b452897608a85293dcf3a4eb70e8635b"}, 0x6, 0x9, 0xb8}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x3b, 0xfa00, {r2, 0x656db417}}, 0x10) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0xffffffffffffffff, 0x201}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r1, 0x80605414, &(0x7f0000000100)) r2 = syz_open_dev$loop(&(0x7f0000000180), 0x6, 0x100) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) 00:37:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000005c0)={0x6, 0x118, 0xfa00, {{0x1, 0x3, "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", 0x0, 0x0, 0x3, 0x8, 0x0, 0x8, 0x9, 0x1}}}, 0x120) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r3}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000180)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0)}}, 0x18) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0xffffffffffffffff, 0x201}}, 0x48) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) (rerun: 32) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r1, 0x80605414, &(0x7f0000000100)) (async) r2 = syz_open_dev$loop(&(0x7f0000000180), 0x6, 0x100) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0xffffffffffffffff, 0x201}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r1, 0x80605414, &(0x7f0000000100)) r2 = syz_open_dev$loop(&(0x7f0000000180), 0x6, 0x100) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0xffffffffffffffff, 0x201}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8}}, 0x10) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) (async) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r1, 0x80605414, &(0x7f0000000100)) (async) syz_open_dev$loop(&(0x7f0000000180), 0x6, 0x100) (async) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) (async) 00:37:35 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r0}}, 0x48) 00:37:35 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r0}}, 0x48) 00:37:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:35 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r0}}, 0x48) 00:37:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x113, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x40, @ipv4={'\x00', '\xff\xff', @local}, 0x8}, {0xa, 0x4e23, 0x8000, @empty, 0x1}, r2, 0xff}}, 0x48) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r4, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast2}, @ib={0x1b, 0x200, 0x7, {"b452897608a85293dcf3a4eb70e8635b"}, 0x6, 0x9, 0xb8}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x3b, 0xfa00, {r2, 0x656db417}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x113, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x106, 0x1}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x40, @ipv4={'\x00', '\xff\xff', @local}, 0x8}, {0xa, 0x4e23, 0x8000, @empty, 0x1}, r2, 0xff}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r4, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast2}, @ib={0x1b, 0x200, 0x7, {"b452897608a85293dcf3a4eb70e8635b"}, 0x6, 0x9, 0xb8}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x3b, 0xfa00, {r2, 0x656db417}}, 0x10) (async) 00:37:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000005c0)={0x6, 0x118, 0xfa00, {{0x1, 0x3, "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", 0x0, 0x0, 0x3, 0x8, 0x0, 0x8, 0x9, 0x1}}}, 0x120) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r3}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000180)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0)}}, 0x18) 00:37:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r7 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r4) sendmsg$BATADV_CMD_TP_METER(r6, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r7, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) sendmsg$BATADV_CMD_GET_HARDIF(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000080}, 0x20004044) 00:37:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x128) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x0, {0x2, 0x5, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$vmci(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), r9, 0x1}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r10, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x2, {0xa, 0x4e20, 0x5, @mcast2, 0xffff8001}, r1}}, 0x38) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async, rerun: 32) r2 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) r7 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r4) sendmsg$BATADV_CMD_TP_METER(r6, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r7, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) (async, rerun: 32) sendmsg$BATADV_CMD_GET_HARDIF(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) (async, rerun: 32) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000080}, 0x20004044) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000005c0)={0x6, 0x118, 0xfa00, {{0x1, 0x3, "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", 0x0, 0x0, 0x3, 0x8, 0x0, 0x8, 0x9, 0x1}}}, 0x120) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), 0xffffffffffffffff, r3}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}}}, 0x48) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000000180)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0)}}, 0x18) 00:37:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) r7 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r4) sendmsg$BATADV_CMD_TP_METER(r6, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r7, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) (async) sendmsg$BATADV_CMD_GET_HARDIF(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000080}, 0x20004044) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x128) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000380)={0x8, 0x120, 0xfa00, {0x0, {0x2, 0x5, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) (async) openat$vmci(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), r9, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r10, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x2, {0xa, 0x4e20, 0x5, @mcast2, 0xffff8001}, r1}}, 0x38) 00:37:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x113, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x40, @ipv4={'\x00', '\xff\xff', @local}, 0x8}, {0xa, 0x4e23, 0x8000, @empty, 0x1}, r2, 0xff}}, 0x48) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000001c0)={0x15, 0x110, 0xfa00, {r4, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast2}, @ib={0x1b, 0x200, 0x7, {"b452897608a85293dcf3a4eb70e8635b"}, 0x6, 0x9, 0xb8}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x3b, 0xfa00, {r2, 0x656db417}}, 0x10) 00:37:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) 00:37:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) 00:37:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x40000000000, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:35 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e23, 0x3f68, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffff}, r2}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) 00:37:35 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4, 0x13}}, 0x10) 00:37:35 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, 0x0, {0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r2}}, 0x48) 00:37:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x40000000000, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x40000000000, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e23, 0x3f68, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffff}, r2}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e23, 0x3f68, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffff}, r2}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000200), 0x111, 0x2}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) (async) 00:37:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, 0x0, {0x0, 0x8}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r2}}, 0x48) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4, 0x13}}, 0x10) 00:37:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x63, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r4, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x1ff, 0x6, "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", 0x80, 0x80, 0xff, 0x9, 0x20, 0x7f, 0x5}, r1}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x2, {0xa, 0x4e23, 0x3f68, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffff}, r2}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r4}}, 0x48) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, 0x0, {0x0, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r2}}, 0x48) 00:37:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4, 0x13}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4, 0x13}}, 0x10) (async) 00:37:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x63, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r4, 0x1}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x1ff, 0x6, "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", 0x80, 0x80, 0xff, 0x9, 0x20, 0x7f, 0x5}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2a}, 0x1000}, r2}}, 0x48) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r2, r3}}, 0x18) 00:37:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0xfd}, 0x2) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0xfd}, 0x2) 00:37:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2a}, 0x1000}, r2}}, 0x48) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r2, r3}}, 0x18) 00:37:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x63, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r4, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x1ff, 0x6, "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", 0x80, 0x80, 0xff, 0x9, 0x20, 0x7f, 0x5}, r1}}, 0x120) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x63, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0xa}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r4, 0x1}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x1ff, 0x6, "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", 0x80, 0x80, 0xff, 0x9, 0x20, 0x7f, 0x5}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0xffffffffffffffa8) 00:37:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r1, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0xfd}, 0x2) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2a}, 0x1000}, r2}}, 0x48) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r2, r3}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2a}, 0x1000}, r2}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r2, r3}}, 0x18) (async) 00:37:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0xffffffffffffffa8) 00:37:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4, @empty, 0x10000000}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0xffffffffffffffa9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x6}}, 0x4) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) 00:37:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e23, 0x3f, @mcast2, 0x7ff}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x128) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0xfffffffffffffffb, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, '\x00', 0x42}}, r4}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0xfffffffffffffe7f) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) 00:37:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4, @empty, 0x10000000}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0xffffffffffffffa9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x6}}, 0x4) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4, @empty, 0x10000000}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0xffffffffffffffa9) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111, 0x6}}, 0x4) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) (async) 00:37:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @remote}, r1}}, 0xffffffffffffffa8) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 00:37:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e23, 0x3f, @mcast2, 0x7ff}, r1}}, 0x38) (rerun: 32) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4, 0x0, @loopback}}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, 0x1}}, 0x18) 00:37:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4, @empty, 0x10000000}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0xffffffffffffffa9) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x6}}, 0x4) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4, @empty, 0x10000000}, {0xa, 0x0, 0x0, @mcast2}, r1}}, 0xffffffffffffffa9) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111, 0x6}}, 0x4) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) (async) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 00:37:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e23, 0x3f, @mcast2, 0x7ff}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e23, 0x3f, @mcast2, 0x7ff}, r1}}, 0x38) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x128) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0xfffffffffffffffb, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, '\x00', 0x42}}, r4}}, 0x38) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0xfffffffffffffe7f) 00:37:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4, 0x0, @loopback}}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, 0x1}}, 0x18) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4, 0x0, @loopback}}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, 0x1}}, 0x18) 00:37:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:36 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r3, 0xab, "eca91b", "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"}}, 0x110) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000400)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000003c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x4, @dev}, r5}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r5}}, 0x10) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x3, {0x9, 0x7fffffff, "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", 0x9, 0xfe, 0x67, 0x7, 0x2, 0xff, 0x3, 0xfc}, r7}}, 0x128) 00:37:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @remote}}}, 0x48) 00:37:37 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, &(0x7f0000000200)={{@hyper, 0x4}, @local, 0x2, 0x7fffffff, 0x9fa1, 0xc6, 0x20000000000, 0x2, 0x3}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14004200", @ANYRES16=r3, @ANYBLOB="010000000000000000000b000000"], 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000429bd70742b2a75d540cb08003400040000"], 0x24}, 0x1, 0x0, 0x0, 0x20000084}, 0x4002110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r5 = getpid() sched_rr_get_interval(r5, &(0x7f0000000000)) ioctl$IOCTL_VMCI_CTX_SET_CPT_STATE(r0, 0x7b2, &(0x7f0000000240)={&(0x7f0000000540)=[0x105, 0x4, 0x6, 0x20, 0x734, 0xffffffe0, 0x1ff, 0x80000000, 0x7fff, 0x1000, 0x6, 0x9, 0x0, 0x2, 0x0, 0x800, 0x1, 0xff, 0x3, 0x6, 0x7, 0x3, 0x2, 0x100, 0x81, 0x7, 0x442, 0x1ff, 0x2, 0x9, 0x7fff, 0x88, 0x0, 0x5, 0x9, 0x0, 0x7a000000, 0x5, 0x3, 0x80, 0x4, 0x4, 0x40, 0x0, 0x7, 0x4, 0x3, 0xfffffffc, 0x7f, 0x9, 0x9, 0x2, 0x0, 0x8, 0x1f, 0x0, 0x7f, 0x80, 0x10000, 0x9057, 0x20, 0x4, 0x1ff, 0x7, 0x7f, 0x9, 0x3f, 0xd8e, 0x81, 0x0, 0x5, 0x941, 0x6, 0x2, 0xffffff80, 0x3, 0x0, 0x1, 0x1, 0x4, 0x5, 0x646a, 0x400, 0x1, 0x7f, 0x3, 0x9e1b, 0xfe7, 0x7, 0xf554, 0x1, 0x8, 0x5, 0x2, 0x80, 0x1ff, 0x1, 0x6d, 0x9, 0x0, 0x2d, 0x8, 0x8, 0x4, 0xffffff80, 0x9, 0x1171, 0x0, 0xffffffff, 0x8, 0x8, 0x6, 0x2fc4, 0x9, 0x0, 0x9, 0xfffffffe, 0xfffffff9, 0x7fff, 0x4, 0x4186, 0x827b, 0x20, 0x8, 0x8, 0x9, 0x9, 0xfffffc01, 0x6, 0x10001, 0x200, 0x100, 0x3, 0x7, 0x8, 0x1ff, 0xa50, 0x7, 0xbe, 0xaa0, 0x6, 0x8001, 0x17df, 0x77, 0x7, 0x23, 0x6, 0x7, 0x2, 0x7, 0x1, 0x40, 0x6, 0xffff9836, 0x1, 0x81, 0x80000001, 0x0, 0x8, 0xfffffffb, 0x7fff, 0x1, 0x9, 0x7, 0x7f, 0x9, 0x6, 0xfffffffd, 0xfffffff7, 0x6, 0x8001, 0x3f, 0x4, 0x1acecc, 0x1, 0xffff, 0xc140, 0x7c9, 0x9, 0x6, 0x3babafeb, 0xfffffffb, 0x6, 0xfffffffb, 0x401, 0x1, 0x5, 0x81, 0x4, 0xfffffffa, 0x5, 0x3c5, 0x4, 0x5, 0x6, 0x8, 0x8, 0xfffffffb, 0x4, 0x3, 0x4, 0x3f, 0xfffffbff, 0x8, 0x2, 0x5, 0x75f, 0x9, 0x4, 0x41d8, 0x4, 0x0, 0x5, 0x80000000, 0x1, 0x7fff, 0x6, 0x401, 0xfffffffa, 0x7d4d, 0xfff, 0xcec9, 0x2, 0x7, 0xb2, 0x1ff, 0x200, 0x9e3, 0x7, 0x7, 0x7fffffff, 0x80, 0x2, 0x1, 0x1, 0x8, 0x5, 0x5, 0x7fff, 0xff, 0xa5ed, 0x2, 0x4, 0x7, 0x8, 0xbb, 0x40, 0x9, 0x5, 0xde9e, 0x2ee, 0x81, 0x0, 0x6, 0xffff4fcb, 0x5, 0xabe, 0x1, 0x401, 0x40, 0x1, 0x40, 0xff, 0x0, 0xa2, 0x1, 0x5, 0x5, 0xea, 0x1ff, 0xb1f, 0xfffffff9, 0x1f, 0x7, 0x9, 0x8, 0x80, 0x2, 0x101, 0x6, 0x7fff, 0x81, 0xc64, 0x9, 0x8000, 0x0, 0x1, 0x0, 0xe6e1, 0xffff, 0x1, 0x6, 0x5, 0x2, 0x8, 0x3, 0x0, 0x4, 0xffffffff, 0x80000000, 0xa5, 0x5, 0x31, 0xe8, 0x7fffffff, 0x800, 0x8001, 0x52, 0x1, 0x3ff, 0x80, 0x8, 0x3, 0x7, 0x40, 0x81, 0xfffffffe, 0x400, 0x4658, 0x8001, 0x3f80, 0x7ff, 0xffffffff, 0x3f, 0x1ff, 0xbf1b, 0x400000, 0x2, 0x0, 0x1, 0x0, 0x7f, 0x400, 0x8, 0x63, 0x3, 0x5, 0xffff, 0x9, 0x4, 0x100, 0x2, 0x4c8, 0xfffffffb, 0xaa, 0x40, 0x9, 0x3, 0x7f, 0x8001, 0x4, 0x3ff, 0x1, 0x8, 0xffff8001, 0x7, 0x9, 0x9, 0x7fff, 0x10000, 0x23c, 0x0, 0xf89, 0x2ea8, 0x6, 0x1, 0xfffffffc, 0x3ff, 0x4c, 0x7fffffff, 0x8, 0x1, 0x40, 0x9d0, 0x3a, 0x7fffffff, 0x800, 0x9, 0x2, 0x10000, 0x7, 0x3, 0x57a3, 0x2, 0xfffffffc, 0x8398, 0x8, 0x200, 0x200, 0x0, 0x6, 0x3, 0x1f, 0x4, 0x5, 0x3, 0x0, 0x5, 0x6e9, 0x6, 0x9, 0x7, 0x20, 0xce9, 0x1, 0x7, 0x1000, 0x0, 0x6, 0x62, 0xb45d, 0x1, 0x0, 0x5, 0x3f, 0x6, 0x2, 0x5, 0x3f, 0x2, 0xad, 0x2, 0xba, 0x4, 0x6, 0x7fff, 0x9, 0x0, 0x3, 0x9c, 0x0, 0x40, 0x7fffffff, 0x0, 0x0, 0x7b92, 0x54d, 0xffffff7f, 0xd53, 0x80000000, 0x9dfa, 0x38, 0x4, 0x7, 0x8, 0x20, 0x9, 0x840, 0x3f, 0x8, 0x2, 0x400, 0x1000, 0x80000001, 0x80000000, 0x8, 0x20, 0x8, 0x2, 0x1, 0x1000, 0x3, 0x4, 0x5, 0x1000, 0x5, 0x1f, 0x7, 0xffffffff, 0xb, 0x3f, 0x1f, 0xb2, 0x2, 0x1, 0x4, 0x8001, 0x6, 0x5, 0x1, 0x0, 0x81, 0x5457, 0x7, 0x80000001, 0x7, 0x4, 0x9, 0x800, 0x1, 0x1f, 0x3, 0x1000, 0x9, 0xfffffffe, 0x2, 0x3, 0xfffffffc, 0x8, 0x7, 0x8, 0x3, 0x3, 0x7, 0x3f, 0x3f, 0x8, 0x5, 0x200, 0x0, 0x800, 0x6, 0x5, 0x5e84ff1f, 0x1ff, 0x6, 0x40, 0x6a, 0x3ff, 0x100, 0x7ff, 0x3ff, 0x1, 0x7, 0xffff, 0x5, 0x3, 0x6, 0x3ff, 0xfff, 0x1, 0x8, 0x7f, 0xa25, 0x9, 0xc3c, 0x9, 0x2, 0x5, 0x1, 0xfff, 0x6, 0x1000, 0x0, 0x3, 0x0, 0x8001, 0x7fff, 0x5, 0xae, 0x80, 0x7, 0xfffff96a, 0x5, 0x20, 0x3, 0x9, 0x9, 0x2, 0x566, 0x81, 0xfffffc40, 0x0, 0x80, 0x400, 0x6b8, 0x1, 0x4, 0x81, 0x2e, 0x7, 0x6, 0x1, 0x0, 0x0, 0x7, 0x1000, 0x2, 0x3ff, 0x64, 0x6, 0x2, 0x3, 0x8001, 0x0, 0x7, 0x8, 0x81, 0x3, 0x32, 0x0, 0x6, 0x1e49, 0x2, 0x16ed, 0x6, 0x1f, 0x1, 0xffffffff, 0x20, 0xeb7, 0xffffffff, 0x7fffffff, 0x2, 0x3af0, 0x7f, 0x4ce2, 0x3, 0x9, 0x10000, 0xfffffffa, 0x29, 0x8, 0x8, 0x4, 0x80, 0x7fffffff, 0x4, 0x80, 0x287, 0x7f, 0x58, 0x4, 0x3, 0x9, 0x2, 0x1000, 0x7fff, 0x20, 0x9, 0xfff, 0x5, 0x6, 0x0, 0x1, 0x1, 0x3, 0x0, 0xffff, 0x8, 0x1f, 0xffffffff, 0x1, 0x3, 0x1, 0x101, 0xfffffffe, 0xa0, 0x1ff, 0x9, 0x3, 0x6dc9, 0x0, 0x1ff, 0x0, 0x1, 0x6cd, 0x9, 0x0, 0x8, 0x2, 0x5, 0xc0000000, 0x7, 0xf5, 0x2, 0x0, 0x7fffffff, 0xa3e, 0x1, 0x3, 0x4d69, 0x3, 0x3, 0x0, 0x7f, 0xffff32f1, 0x1f, 0x8, 0x1, 0xffffffe0, 0x2, 0x3, 0xfffffc00, 0x5, 0xffff, 0x3, 0x9, 0x0, 0x4, 0x0, 0x0, 0x7fffffff, 0x40, 0xfffffe01, 0x9, 0xffff, 0x1, 0xfffffff9, 0x8, 0xd25, 0x75, 0x4, 0x0, 0x9, 0x6235, 0x10001, 0x5, 0x14000000, 0xffffffff, 0x3, 0x3, 0x100, 0x2, 0x0, 0xe10, 0x1, 0x1f, 0x2, 0x10000, 0x7f, 0x10001, 0x0, 0x6, 0x80000000, 0x3, 0x8, 0x9, 0x401, 0x4, 0xf21, 0x10001, 0x400, 0x8da, 0x5, 0x3, 0x8, 0x1, 0x5, 0x7, 0x3000, 0x5, 0x8000, 0x3, 0x3, 0x4, 0x7ff, 0x9, 0x4, 0x1, 0x0, 0x3ff, 0x9, 0x9, 0x200, 0x6ee7, 0x6, 0x8, 0x40, 0x2, 0x2e0, 0x2, 0x1, 0x3, 0x400000, 0xbc, 0x1000, 0x700000, 0x4, 0x2, 0x0, 0x7, 0x80010000, 0x7ff, 0x2400000, 0x2, 0x7, 0x1, 0x10000, 0xff, 0x7fff, 0x6, 0x7, 0x0, 0x8, 0x4, 0x7, 0x81, 0x1, 0x4, 0x2, 0x1f, 0x1a, 0x0, 0x3, 0xfff, 0x800, 0x5, 0x3ff, 0x1000, 0x9b, 0x3, 0x7fff, 0xcbe, 0xd5, 0x8, 0x6, 0x0, 0x3f, 0xd, 0x7, 0x3, 0x0, 0x0, 0x2, 0xffffdcdd, 0x7, 0x6, 0x7, 0x392e, 0x2, 0xa91, 0x0, 0x8, 0x200, 0xe7e, 0x200, 0x8, 0x1, 0xd4c, 0xb8e, 0x6, 0x8000, 0x508a, 0x8256, 0x800, 0x0, 0x3f, 0x80000000, 0x1b4, 0x5, 0x1, 0x3, 0xa49c, 0x5, 0x1000, 0x6, 0x7, 0x80000001, 0x9, 0xfe, 0xb05, 0x3ff, 0x2, 0x1000, 0x6, 0x5, 0x10000, 0x8, 0xffffffff, 0x4, 0x1, 0x20, 0x80000001, 0x6, 0xf4c9a2b4, 0x9, 0x0, 0x877, 0x7, 0x5, 0x4aa1, 0x7, 0x2, 0xffff7fff, 0xf1, 0x7, 0xfffffbff, 0x2, 0x9, 0x4, 0x8, 0x0, 0x0, 0x7, 0x4, 0x0, 0x1ff, 0x7, 0x7, 0xef, 0x73be, 0xffffffff, 0x2, 0xa9, 0x1, 0x5, 0x2569, 0x9c0765e, 0x8000, 0x9, 0x7, 0x9, 0xfffffffa, 0x63a, 0xc3, 0xfff, 0x9, 0xff, 0x180000, 0x0, 0x1, 0x800, 0x8000, 0xca5, 0x7adc, 0x3, 0x6, 0x1, 0x100, 0x4, 0x5, 0x300e, 0x7, 0x3a64, 0x2, 0x7fffffff, 0x1000, 0x7, 0xff, 0x1, 0xd20f, 0x9, 0x7ff, 0x20, 0x81, 0x6, 0x1ff, 0x7, 0x7, 0x5dda, 0x6, 0x3f, 0x1000, 0x6, 0x3, 0xb0a, 0x1, 0x9, 0x9, 0x579, 0x9, 0x5, 0x1, 0x5, 0x6, 0x0, 0x6, 0x80000000, 0x9, 0x100, 0x5, 0x0, 0x8000, 0x6, 0xdf5c, 0x2440, 0x81, 0x1f, 0x800, 0x3, 0x87, 0x9, 0xc302, 0xc5, 0x1, 0x6, 0x1, 0x0, 0x9, 0x9, 0x14b0c887, 0xde, 0x6b0a9509, 0x400, 0x3, 0x62, 0x8, 0x7f, 0x200, 0xd9, 0x9, 0x5, 0x6, 0xfd, 0x2, 0x8, 0x2, 0x5, 0xe58e, 0x2, 0xffff0001, 0x81, 0x40, 0x1000, 0x7fffffff, 0x6af, 0x6cff, 0x10000, 0x7, 0x2, 0x1000, 0x10000, 0xf42, 0x40, 0x7fff, 0xffff0001, 0x6, 0xffffffc0, 0xffffffff, 0x7ff, 0x6, 0x9, 0x80000001], 0x3, 0x400, 0x1}) sched_setparam(r5, &(0x7f00000001c0)=0x9) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r6}}, 0x30) 00:37:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0xfffffffffffffffb, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x0, {0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, '\x00', 0x42}}, r4}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0xfffffffffffffe7f) 00:37:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async, rerun: 32) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r3, 0xab, "eca91b", "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"}}, 0x110) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000400)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000003c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x4, @dev}, r5}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r5}}, 0x10) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x3, {0x9, 0x7fffffff, "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", 0x9, 0xfe, 0x67, 0x7, 0x2, 0xff, 0x3, 0xfc}, r7}}, 0x128) 00:37:37 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, &(0x7f0000000200)={{@hyper, 0x4}, @local, 0x2, 0x7fffffff, 0x9fa1, 0xc6, 0x20000000000, 0x2, 0x3}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14004200", @ANYRES16=r3, @ANYBLOB="010000000000000000000b000000"], 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000429bd70742b2a75d540cb08003400040000"], 0x24}, 0x1, 0x0, 0x0, 0x20000084}, 0x4002110) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r5 = getpid() sched_rr_get_interval(r5, &(0x7f0000000000)) ioctl$IOCTL_VMCI_CTX_SET_CPT_STATE(r0, 0x7b2, &(0x7f0000000240)={&(0x7f0000000540)=[0x105, 0x4, 0x6, 0x20, 0x734, 0xffffffe0, 0x1ff, 0x80000000, 0x7fff, 0x1000, 0x6, 0x9, 0x0, 0x2, 0x0, 0x800, 0x1, 0xff, 0x3, 0x6, 0x7, 0x3, 0x2, 0x100, 0x81, 0x7, 0x442, 0x1ff, 0x2, 0x9, 0x7fff, 0x88, 0x0, 0x5, 0x9, 0x0, 0x7a000000, 0x5, 0x3, 0x80, 0x4, 0x4, 0x40, 0x0, 0x7, 0x4, 0x3, 0xfffffffc, 0x7f, 0x9, 0x9, 0x2, 0x0, 0x8, 0x1f, 0x0, 0x7f, 0x80, 0x10000, 0x9057, 0x20, 0x4, 0x1ff, 0x7, 0x7f, 0x9, 0x3f, 0xd8e, 0x81, 0x0, 0x5, 0x941, 0x6, 0x2, 0xffffff80, 0x3, 0x0, 0x1, 0x1, 0x4, 0x5, 0x646a, 0x400, 0x1, 0x7f, 0x3, 0x9e1b, 0xfe7, 0x7, 0xf554, 0x1, 0x8, 0x5, 0x2, 0x80, 0x1ff, 0x1, 0x6d, 0x9, 0x0, 0x2d, 0x8, 0x8, 0x4, 0xffffff80, 0x9, 0x1171, 0x0, 0xffffffff, 0x8, 0x8, 0x6, 0x2fc4, 0x9, 0x0, 0x9, 0xfffffffe, 0xfffffff9, 0x7fff, 0x4, 0x4186, 0x827b, 0x20, 0x8, 0x8, 0x9, 0x9, 0xfffffc01, 0x6, 0x10001, 0x200, 0x100, 0x3, 0x7, 0x8, 0x1ff, 0xa50, 0x7, 0xbe, 0xaa0, 0x6, 0x8001, 0x17df, 0x77, 0x7, 0x23, 0x6, 0x7, 0x2, 0x7, 0x1, 0x40, 0x6, 0xffff9836, 0x1, 0x81, 0x80000001, 0x0, 0x8, 0xfffffffb, 0x7fff, 0x1, 0x9, 0x7, 0x7f, 0x9, 0x6, 0xfffffffd, 0xfffffff7, 0x6, 0x8001, 0x3f, 0x4, 0x1acecc, 0x1, 0xffff, 0xc140, 0x7c9, 0x9, 0x6, 0x3babafeb, 0xfffffffb, 0x6, 0xfffffffb, 0x401, 0x1, 0x5, 0x81, 0x4, 0xfffffffa, 0x5, 0x3c5, 0x4, 0x5, 0x6, 0x8, 0x8, 0xfffffffb, 0x4, 0x3, 0x4, 0x3f, 0xfffffbff, 0x8, 0x2, 0x5, 0x75f, 0x9, 0x4, 0x41d8, 0x4, 0x0, 0x5, 0x80000000, 0x1, 0x7fff, 0x6, 0x401, 0xfffffffa, 0x7d4d, 0xfff, 0xcec9, 0x2, 0x7, 0xb2, 0x1ff, 0x200, 0x9e3, 0x7, 0x7, 0x7fffffff, 0x80, 0x2, 0x1, 0x1, 0x8, 0x5, 0x5, 0x7fff, 0xff, 0xa5ed, 0x2, 0x4, 0x7, 0x8, 0xbb, 0x40, 0x9, 0x5, 0xde9e, 0x2ee, 0x81, 0x0, 0x6, 0xffff4fcb, 0x5, 0xabe, 0x1, 0x401, 0x40, 0x1, 0x40, 0xff, 0x0, 0xa2, 0x1, 0x5, 0x5, 0xea, 0x1ff, 0xb1f, 0xfffffff9, 0x1f, 0x7, 0x9, 0x8, 0x80, 0x2, 0x101, 0x6, 0x7fff, 0x81, 0xc64, 0x9, 0x8000, 0x0, 0x1, 0x0, 0xe6e1, 0xffff, 0x1, 0x6, 0x5, 0x2, 0x8, 0x3, 0x0, 0x4, 0xffffffff, 0x80000000, 0xa5, 0x5, 0x31, 0xe8, 0x7fffffff, 0x800, 0x8001, 0x52, 0x1, 0x3ff, 0x80, 0x8, 0x3, 0x7, 0x40, 0x81, 0xfffffffe, 0x400, 0x4658, 0x8001, 0x3f80, 0x7ff, 0xffffffff, 0x3f, 0x1ff, 0xbf1b, 0x400000, 0x2, 0x0, 0x1, 0x0, 0x7f, 0x400, 0x8, 0x63, 0x3, 0x5, 0xffff, 0x9, 0x4, 0x100, 0x2, 0x4c8, 0xfffffffb, 0xaa, 0x40, 0x9, 0x3, 0x7f, 0x8001, 0x4, 0x3ff, 0x1, 0x8, 0xffff8001, 0x7, 0x9, 0x9, 0x7fff, 0x10000, 0x23c, 0x0, 0xf89, 0x2ea8, 0x6, 0x1, 0xfffffffc, 0x3ff, 0x4c, 0x7fffffff, 0x8, 0x1, 0x40, 0x9d0, 0x3a, 0x7fffffff, 0x800, 0x9, 0x2, 0x10000, 0x7, 0x3, 0x57a3, 0x2, 0xfffffffc, 0x8398, 0x8, 0x200, 0x200, 0x0, 0x6, 0x3, 0x1f, 0x4, 0x5, 0x3, 0x0, 0x5, 0x6e9, 0x6, 0x9, 0x7, 0x20, 0xce9, 0x1, 0x7, 0x1000, 0x0, 0x6, 0x62, 0xb45d, 0x1, 0x0, 0x5, 0x3f, 0x6, 0x2, 0x5, 0x3f, 0x2, 0xad, 0x2, 0xba, 0x4, 0x6, 0x7fff, 0x9, 0x0, 0x3, 0x9c, 0x0, 0x40, 0x7fffffff, 0x0, 0x0, 0x7b92, 0x54d, 0xffffff7f, 0xd53, 0x80000000, 0x9dfa, 0x38, 0x4, 0x7, 0x8, 0x20, 0x9, 0x840, 0x3f, 0x8, 0x2, 0x400, 0x1000, 0x80000001, 0x80000000, 0x8, 0x20, 0x8, 0x2, 0x1, 0x1000, 0x3, 0x4, 0x5, 0x1000, 0x5, 0x1f, 0x7, 0xffffffff, 0xb, 0x3f, 0x1f, 0xb2, 0x2, 0x1, 0x4, 0x8001, 0x6, 0x5, 0x1, 0x0, 0x81, 0x5457, 0x7, 0x80000001, 0x7, 0x4, 0x9, 0x800, 0x1, 0x1f, 0x3, 0x1000, 0x9, 0xfffffffe, 0x2, 0x3, 0xfffffffc, 0x8, 0x7, 0x8, 0x3, 0x3, 0x7, 0x3f, 0x3f, 0x8, 0x5, 0x200, 0x0, 0x800, 0x6, 0x5, 0x5e84ff1f, 0x1ff, 0x6, 0x40, 0x6a, 0x3ff, 0x100, 0x7ff, 0x3ff, 0x1, 0x7, 0xffff, 0x5, 0x3, 0x6, 0x3ff, 0xfff, 0x1, 0x8, 0x7f, 0xa25, 0x9, 0xc3c, 0x9, 0x2, 0x5, 0x1, 0xfff, 0x6, 0x1000, 0x0, 0x3, 0x0, 0x8001, 0x7fff, 0x5, 0xae, 0x80, 0x7, 0xfffff96a, 0x5, 0x20, 0x3, 0x9, 0x9, 0x2, 0x566, 0x81, 0xfffffc40, 0x0, 0x80, 0x400, 0x6b8, 0x1, 0x4, 0x81, 0x2e, 0x7, 0x6, 0x1, 0x0, 0x0, 0x7, 0x1000, 0x2, 0x3ff, 0x64, 0x6, 0x2, 0x3, 0x8001, 0x0, 0x7, 0x8, 0x81, 0x3, 0x32, 0x0, 0x6, 0x1e49, 0x2, 0x16ed, 0x6, 0x1f, 0x1, 0xffffffff, 0x20, 0xeb7, 0xffffffff, 0x7fffffff, 0x2, 0x3af0, 0x7f, 0x4ce2, 0x3, 0x9, 0x10000, 0xfffffffa, 0x29, 0x8, 0x8, 0x4, 0x80, 0x7fffffff, 0x4, 0x80, 0x287, 0x7f, 0x58, 0x4, 0x3, 0x9, 0x2, 0x1000, 0x7fff, 0x20, 0x9, 0xfff, 0x5, 0x6, 0x0, 0x1, 0x1, 0x3, 0x0, 0xffff, 0x8, 0x1f, 0xffffffff, 0x1, 0x3, 0x1, 0x101, 0xfffffffe, 0xa0, 0x1ff, 0x9, 0x3, 0x6dc9, 0x0, 0x1ff, 0x0, 0x1, 0x6cd, 0x9, 0x0, 0x8, 0x2, 0x5, 0xc0000000, 0x7, 0xf5, 0x2, 0x0, 0x7fffffff, 0xa3e, 0x1, 0x3, 0x4d69, 0x3, 0x3, 0x0, 0x7f, 0xffff32f1, 0x1f, 0x8, 0x1, 0xffffffe0, 0x2, 0x3, 0xfffffc00, 0x5, 0xffff, 0x3, 0x9, 0x0, 0x4, 0x0, 0x0, 0x7fffffff, 0x40, 0xfffffe01, 0x9, 0xffff, 0x1, 0xfffffff9, 0x8, 0xd25, 0x75, 0x4, 0x0, 0x9, 0x6235, 0x10001, 0x5, 0x14000000, 0xffffffff, 0x3, 0x3, 0x100, 0x2, 0x0, 0xe10, 0x1, 0x1f, 0x2, 0x10000, 0x7f, 0x10001, 0x0, 0x6, 0x80000000, 0x3, 0x8, 0x9, 0x401, 0x4, 0xf21, 0x10001, 0x400, 0x8da, 0x5, 0x3, 0x8, 0x1, 0x5, 0x7, 0x3000, 0x5, 0x8000, 0x3, 0x3, 0x4, 0x7ff, 0x9, 0x4, 0x1, 0x0, 0x3ff, 0x9, 0x9, 0x200, 0x6ee7, 0x6, 0x8, 0x40, 0x2, 0x2e0, 0x2, 0x1, 0x3, 0x400000, 0xbc, 0x1000, 0x700000, 0x4, 0x2, 0x0, 0x7, 0x80010000, 0x7ff, 0x2400000, 0x2, 0x7, 0x1, 0x10000, 0xff, 0x7fff, 0x6, 0x7, 0x0, 0x8, 0x4, 0x7, 0x81, 0x1, 0x4, 0x2, 0x1f, 0x1a, 0x0, 0x3, 0xfff, 0x800, 0x5, 0x3ff, 0x1000, 0x9b, 0x3, 0x7fff, 0xcbe, 0xd5, 0x8, 0x6, 0x0, 0x3f, 0xd, 0x7, 0x3, 0x0, 0x0, 0x2, 0xffffdcdd, 0x7, 0x6, 0x7, 0x392e, 0x2, 0xa91, 0x0, 0x8, 0x200, 0xe7e, 0x200, 0x8, 0x1, 0xd4c, 0xb8e, 0x6, 0x8000, 0x508a, 0x8256, 0x800, 0x0, 0x3f, 0x80000000, 0x1b4, 0x5, 0x1, 0x3, 0xa49c, 0x5, 0x1000, 0x6, 0x7, 0x80000001, 0x9, 0xfe, 0xb05, 0x3ff, 0x2, 0x1000, 0x6, 0x5, 0x10000, 0x8, 0xffffffff, 0x4, 0x1, 0x20, 0x80000001, 0x6, 0xf4c9a2b4, 0x9, 0x0, 0x877, 0x7, 0x5, 0x4aa1, 0x7, 0x2, 0xffff7fff, 0xf1, 0x7, 0xfffffbff, 0x2, 0x9, 0x4, 0x8, 0x0, 0x0, 0x7, 0x4, 0x0, 0x1ff, 0x7, 0x7, 0xef, 0x73be, 0xffffffff, 0x2, 0xa9, 0x1, 0x5, 0x2569, 0x9c0765e, 0x8000, 0x9, 0x7, 0x9, 0xfffffffa, 0x63a, 0xc3, 0xfff, 0x9, 0xff, 0x180000, 0x0, 0x1, 0x800, 0x8000, 0xca5, 0x7adc, 0x3, 0x6, 0x1, 0x100, 0x4, 0x5, 0x300e, 0x7, 0x3a64, 0x2, 0x7fffffff, 0x1000, 0x7, 0xff, 0x1, 0xd20f, 0x9, 0x7ff, 0x20, 0x81, 0x6, 0x1ff, 0x7, 0x7, 0x5dda, 0x6, 0x3f, 0x1000, 0x6, 0x3, 0xb0a, 0x1, 0x9, 0x9, 0x579, 0x9, 0x5, 0x1, 0x5, 0x6, 0x0, 0x6, 0x80000000, 0x9, 0x100, 0x5, 0x0, 0x8000, 0x6, 0xdf5c, 0x2440, 0x81, 0x1f, 0x800, 0x3, 0x87, 0x9, 0xc302, 0xc5, 0x1, 0x6, 0x1, 0x0, 0x9, 0x9, 0x14b0c887, 0xde, 0x6b0a9509, 0x400, 0x3, 0x62, 0x8, 0x7f, 0x200, 0xd9, 0x9, 0x5, 0x6, 0xfd, 0x2, 0x8, 0x2, 0x5, 0xe58e, 0x2, 0xffff0001, 0x81, 0x40, 0x1000, 0x7fffffff, 0x6af, 0x6cff, 0x10000, 0x7, 0x2, 0x1000, 0x10000, 0xf42, 0x40, 0x7fff, 0xffff0001, 0x6, 0xffffffc0, 0xffffffff, 0x7ff, 0x6, 0x9, 0x80000001], 0x3, 0x400, 0x1}) sched_setparam(r5, &(0x7f00000001c0)=0x9) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r6}}, 0x30) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, 0x0) (async) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, &(0x7f0000000200)={{@hyper, 0x4}, @local, 0x2, 0x7fffffff, 0x9fa1, 0xc6, 0x20000000000, 0x2, 0x3}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14004200", @ANYRES16=r3, @ANYBLOB="010000000000000000000b000000"], 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000429bd70742b2a75d540cb08003400040000"], 0x24}, 0x1, 0x0, 0x0, 0x20000084}, 0x4002110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) getpid() (async) sched_rr_get_interval(r5, &(0x7f0000000000)) (async) ioctl$IOCTL_VMCI_CTX_SET_CPT_STATE(r0, 0x7b2, &(0x7f0000000240)={&(0x7f0000000540)=[0x105, 0x4, 0x6, 0x20, 0x734, 0xffffffe0, 0x1ff, 0x80000000, 0x7fff, 0x1000, 0x6, 0x9, 0x0, 0x2, 0x0, 0x800, 0x1, 0xff, 0x3, 0x6, 0x7, 0x3, 0x2, 0x100, 0x81, 0x7, 0x442, 0x1ff, 0x2, 0x9, 0x7fff, 0x88, 0x0, 0x5, 0x9, 0x0, 0x7a000000, 0x5, 0x3, 0x80, 0x4, 0x4, 0x40, 0x0, 0x7, 0x4, 0x3, 0xfffffffc, 0x7f, 0x9, 0x9, 0x2, 0x0, 0x8, 0x1f, 0x0, 0x7f, 0x80, 0x10000, 0x9057, 0x20, 0x4, 0x1ff, 0x7, 0x7f, 0x9, 0x3f, 0xd8e, 0x81, 0x0, 0x5, 0x941, 0x6, 0x2, 0xffffff80, 0x3, 0x0, 0x1, 0x1, 0x4, 0x5, 0x646a, 0x400, 0x1, 0x7f, 0x3, 0x9e1b, 0xfe7, 0x7, 0xf554, 0x1, 0x8, 0x5, 0x2, 0x80, 0x1ff, 0x1, 0x6d, 0x9, 0x0, 0x2d, 0x8, 0x8, 0x4, 0xffffff80, 0x9, 0x1171, 0x0, 0xffffffff, 0x8, 0x8, 0x6, 0x2fc4, 0x9, 0x0, 0x9, 0xfffffffe, 0xfffffff9, 0x7fff, 0x4, 0x4186, 0x827b, 0x20, 0x8, 0x8, 0x9, 0x9, 0xfffffc01, 0x6, 0x10001, 0x200, 0x100, 0x3, 0x7, 0x8, 0x1ff, 0xa50, 0x7, 0xbe, 0xaa0, 0x6, 0x8001, 0x17df, 0x77, 0x7, 0x23, 0x6, 0x7, 0x2, 0x7, 0x1, 0x40, 0x6, 0xffff9836, 0x1, 0x81, 0x80000001, 0x0, 0x8, 0xfffffffb, 0x7fff, 0x1, 0x9, 0x7, 0x7f, 0x9, 0x6, 0xfffffffd, 0xfffffff7, 0x6, 0x8001, 0x3f, 0x4, 0x1acecc, 0x1, 0xffff, 0xc140, 0x7c9, 0x9, 0x6, 0x3babafeb, 0xfffffffb, 0x6, 0xfffffffb, 0x401, 0x1, 0x5, 0x81, 0x4, 0xfffffffa, 0x5, 0x3c5, 0x4, 0x5, 0x6, 0x8, 0x8, 0xfffffffb, 0x4, 0x3, 0x4, 0x3f, 0xfffffbff, 0x8, 0x2, 0x5, 0x75f, 0x9, 0x4, 0x41d8, 0x4, 0x0, 0x5, 0x80000000, 0x1, 0x7fff, 0x6, 0x401, 0xfffffffa, 0x7d4d, 0xfff, 0xcec9, 0x2, 0x7, 0xb2, 0x1ff, 0x200, 0x9e3, 0x7, 0x7, 0x7fffffff, 0x80, 0x2, 0x1, 0x1, 0x8, 0x5, 0x5, 0x7fff, 0xff, 0xa5ed, 0x2, 0x4, 0x7, 0x8, 0xbb, 0x40, 0x9, 0x5, 0xde9e, 0x2ee, 0x81, 0x0, 0x6, 0xffff4fcb, 0x5, 0xabe, 0x1, 0x401, 0x40, 0x1, 0x40, 0xff, 0x0, 0xa2, 0x1, 0x5, 0x5, 0xea, 0x1ff, 0xb1f, 0xfffffff9, 0x1f, 0x7, 0x9, 0x8, 0x80, 0x2, 0x101, 0x6, 0x7fff, 0x81, 0xc64, 0x9, 0x8000, 0x0, 0x1, 0x0, 0xe6e1, 0xffff, 0x1, 0x6, 0x5, 0x2, 0x8, 0x3, 0x0, 0x4, 0xffffffff, 0x80000000, 0xa5, 0x5, 0x31, 0xe8, 0x7fffffff, 0x800, 0x8001, 0x52, 0x1, 0x3ff, 0x80, 0x8, 0x3, 0x7, 0x40, 0x81, 0xfffffffe, 0x400, 0x4658, 0x8001, 0x3f80, 0x7ff, 0xffffffff, 0x3f, 0x1ff, 0xbf1b, 0x400000, 0x2, 0x0, 0x1, 0x0, 0x7f, 0x400, 0x8, 0x63, 0x3, 0x5, 0xffff, 0x9, 0x4, 0x100, 0x2, 0x4c8, 0xfffffffb, 0xaa, 0x40, 0x9, 0x3, 0x7f, 0x8001, 0x4, 0x3ff, 0x1, 0x8, 0xffff8001, 0x7, 0x9, 0x9, 0x7fff, 0x10000, 0x23c, 0x0, 0xf89, 0x2ea8, 0x6, 0x1, 0xfffffffc, 0x3ff, 0x4c, 0x7fffffff, 0x8, 0x1, 0x40, 0x9d0, 0x3a, 0x7fffffff, 0x800, 0x9, 0x2, 0x10000, 0x7, 0x3, 0x57a3, 0x2, 0xfffffffc, 0x8398, 0x8, 0x200, 0x200, 0x0, 0x6, 0x3, 0x1f, 0x4, 0x5, 0x3, 0x0, 0x5, 0x6e9, 0x6, 0x9, 0x7, 0x20, 0xce9, 0x1, 0x7, 0x1000, 0x0, 0x6, 0x62, 0xb45d, 0x1, 0x0, 0x5, 0x3f, 0x6, 0x2, 0x5, 0x3f, 0x2, 0xad, 0x2, 0xba, 0x4, 0x6, 0x7fff, 0x9, 0x0, 0x3, 0x9c, 0x0, 0x40, 0x7fffffff, 0x0, 0x0, 0x7b92, 0x54d, 0xffffff7f, 0xd53, 0x80000000, 0x9dfa, 0x38, 0x4, 0x7, 0x8, 0x20, 0x9, 0x840, 0x3f, 0x8, 0x2, 0x400, 0x1000, 0x80000001, 0x80000000, 0x8, 0x20, 0x8, 0x2, 0x1, 0x1000, 0x3, 0x4, 0x5, 0x1000, 0x5, 0x1f, 0x7, 0xffffffff, 0xb, 0x3f, 0x1f, 0xb2, 0x2, 0x1, 0x4, 0x8001, 0x6, 0x5, 0x1, 0x0, 0x81, 0x5457, 0x7, 0x80000001, 0x7, 0x4, 0x9, 0x800, 0x1, 0x1f, 0x3, 0x1000, 0x9, 0xfffffffe, 0x2, 0x3, 0xfffffffc, 0x8, 0x7, 0x8, 0x3, 0x3, 0x7, 0x3f, 0x3f, 0x8, 0x5, 0x200, 0x0, 0x800, 0x6, 0x5, 0x5e84ff1f, 0x1ff, 0x6, 0x40, 0x6a, 0x3ff, 0x100, 0x7ff, 0x3ff, 0x1, 0x7, 0xffff, 0x5, 0x3, 0x6, 0x3ff, 0xfff, 0x1, 0x8, 0x7f, 0xa25, 0x9, 0xc3c, 0x9, 0x2, 0x5, 0x1, 0xfff, 0x6, 0x1000, 0x0, 0x3, 0x0, 0x8001, 0x7fff, 0x5, 0xae, 0x80, 0x7, 0xfffff96a, 0x5, 0x20, 0x3, 0x9, 0x9, 0x2, 0x566, 0x81, 0xfffffc40, 0x0, 0x80, 0x400, 0x6b8, 0x1, 0x4, 0x81, 0x2e, 0x7, 0x6, 0x1, 0x0, 0x0, 0x7, 0x1000, 0x2, 0x3ff, 0x64, 0x6, 0x2, 0x3, 0x8001, 0x0, 0x7, 0x8, 0x81, 0x3, 0x32, 0x0, 0x6, 0x1e49, 0x2, 0x16ed, 0x6, 0x1f, 0x1, 0xffffffff, 0x20, 0xeb7, 0xffffffff, 0x7fffffff, 0x2, 0x3af0, 0x7f, 0x4ce2, 0x3, 0x9, 0x10000, 0xfffffffa, 0x29, 0x8, 0x8, 0x4, 0x80, 0x7fffffff, 0x4, 0x80, 0x287, 0x7f, 0x58, 0x4, 0x3, 0x9, 0x2, 0x1000, 0x7fff, 0x20, 0x9, 0xfff, 0x5, 0x6, 0x0, 0x1, 0x1, 0x3, 0x0, 0xffff, 0x8, 0x1f, 0xffffffff, 0x1, 0x3, 0x1, 0x101, 0xfffffffe, 0xa0, 0x1ff, 0x9, 0x3, 0x6dc9, 0x0, 0x1ff, 0x0, 0x1, 0x6cd, 0x9, 0x0, 0x8, 0x2, 0x5, 0xc0000000, 0x7, 0xf5, 0x2, 0x0, 0x7fffffff, 0xa3e, 0x1, 0x3, 0x4d69, 0x3, 0x3, 0x0, 0x7f, 0xffff32f1, 0x1f, 0x8, 0x1, 0xffffffe0, 0x2, 0x3, 0xfffffc00, 0x5, 0xffff, 0x3, 0x9, 0x0, 0x4, 0x0, 0x0, 0x7fffffff, 0x40, 0xfffffe01, 0x9, 0xffff, 0x1, 0xfffffff9, 0x8, 0xd25, 0x75, 0x4, 0x0, 0x9, 0x6235, 0x10001, 0x5, 0x14000000, 0xffffffff, 0x3, 0x3, 0x100, 0x2, 0x0, 0xe10, 0x1, 0x1f, 0x2, 0x10000, 0x7f, 0x10001, 0x0, 0x6, 0x80000000, 0x3, 0x8, 0x9, 0x401, 0x4, 0xf21, 0x10001, 0x400, 0x8da, 0x5, 0x3, 0x8, 0x1, 0x5, 0x7, 0x3000, 0x5, 0x8000, 0x3, 0x3, 0x4, 0x7ff, 0x9, 0x4, 0x1, 0x0, 0x3ff, 0x9, 0x9, 0x200, 0x6ee7, 0x6, 0x8, 0x40, 0x2, 0x2e0, 0x2, 0x1, 0x3, 0x400000, 0xbc, 0x1000, 0x700000, 0x4, 0x2, 0x0, 0x7, 0x80010000, 0x7ff, 0x2400000, 0x2, 0x7, 0x1, 0x10000, 0xff, 0x7fff, 0x6, 0x7, 0x0, 0x8, 0x4, 0x7, 0x81, 0x1, 0x4, 0x2, 0x1f, 0x1a, 0x0, 0x3, 0xfff, 0x800, 0x5, 0x3ff, 0x1000, 0x9b, 0x3, 0x7fff, 0xcbe, 0xd5, 0x8, 0x6, 0x0, 0x3f, 0xd, 0x7, 0x3, 0x0, 0x0, 0x2, 0xffffdcdd, 0x7, 0x6, 0x7, 0x392e, 0x2, 0xa91, 0x0, 0x8, 0x200, 0xe7e, 0x200, 0x8, 0x1, 0xd4c, 0xb8e, 0x6, 0x8000, 0x508a, 0x8256, 0x800, 0x0, 0x3f, 0x80000000, 0x1b4, 0x5, 0x1, 0x3, 0xa49c, 0x5, 0x1000, 0x6, 0x7, 0x80000001, 0x9, 0xfe, 0xb05, 0x3ff, 0x2, 0x1000, 0x6, 0x5, 0x10000, 0x8, 0xffffffff, 0x4, 0x1, 0x20, 0x80000001, 0x6, 0xf4c9a2b4, 0x9, 0x0, 0x877, 0x7, 0x5, 0x4aa1, 0x7, 0x2, 0xffff7fff, 0xf1, 0x7, 0xfffffbff, 0x2, 0x9, 0x4, 0x8, 0x0, 0x0, 0x7, 0x4, 0x0, 0x1ff, 0x7, 0x7, 0xef, 0x73be, 0xffffffff, 0x2, 0xa9, 0x1, 0x5, 0x2569, 0x9c0765e, 0x8000, 0x9, 0x7, 0x9, 0xfffffffa, 0x63a, 0xc3, 0xfff, 0x9, 0xff, 0x180000, 0x0, 0x1, 0x800, 0x8000, 0xca5, 0x7adc, 0x3, 0x6, 0x1, 0x100, 0x4, 0x5, 0x300e, 0x7, 0x3a64, 0x2, 0x7fffffff, 0x1000, 0x7, 0xff, 0x1, 0xd20f, 0x9, 0x7ff, 0x20, 0x81, 0x6, 0x1ff, 0x7, 0x7, 0x5dda, 0x6, 0x3f, 0x1000, 0x6, 0x3, 0xb0a, 0x1, 0x9, 0x9, 0x579, 0x9, 0x5, 0x1, 0x5, 0x6, 0x0, 0x6, 0x80000000, 0x9, 0x100, 0x5, 0x0, 0x8000, 0x6, 0xdf5c, 0x2440, 0x81, 0x1f, 0x800, 0x3, 0x87, 0x9, 0xc302, 0xc5, 0x1, 0x6, 0x1, 0x0, 0x9, 0x9, 0x14b0c887, 0xde, 0x6b0a9509, 0x400, 0x3, 0x62, 0x8, 0x7f, 0x200, 0xd9, 0x9, 0x5, 0x6, 0xfd, 0x2, 0x8, 0x2, 0x5, 0xe58e, 0x2, 0xffff0001, 0x81, 0x40, 0x1000, 0x7fffffff, 0x6af, 0x6cff, 0x10000, 0x7, 0x2, 0x1000, 0x10000, 0xf42, 0x40, 0x7fff, 0xffff0001, 0x6, 0xffffffc0, 0xffffffff, 0x7ff, 0x6, 0x9, 0x80000001], 0x3, 0x400, 0x1}) (async) sched_setparam(r5, &(0x7f00000001c0)=0x9) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r6}}, 0x30) (async) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4, 0x0, @loopback}}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, 0x1}}, 0x18) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1000}, {0xa, 0x4, 0x0, @dev}, r1, 0x4}}, 0x48) 00:37:37 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, &(0x7f0000000200)={{@hyper, 0x4}, @local, 0x2, 0x7fffffff, 0x9fa1, 0xc6, 0x20000000000, 0x2, 0x3}) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14004200", @ANYRES16=r3, @ANYBLOB="010000000000000000000b000000"], 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000429bd70742b2a75d540cb08003400040000"], 0x24}, 0x1, 0x0, 0x0, 0x20000084}, 0x4002110) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async, rerun: 64) r5 = getpid() (rerun: 64) sched_rr_get_interval(r5, &(0x7f0000000000)) (async, rerun: 64) ioctl$IOCTL_VMCI_CTX_SET_CPT_STATE(r0, 0x7b2, &(0x7f0000000240)={&(0x7f0000000540)=[0x105, 0x4, 0x6, 0x20, 0x734, 0xffffffe0, 0x1ff, 0x80000000, 0x7fff, 0x1000, 0x6, 0x9, 0x0, 0x2, 0x0, 0x800, 0x1, 0xff, 0x3, 0x6, 0x7, 0x3, 0x2, 0x100, 0x81, 0x7, 0x442, 0x1ff, 0x2, 0x9, 0x7fff, 0x88, 0x0, 0x5, 0x9, 0x0, 0x7a000000, 0x5, 0x3, 0x80, 0x4, 0x4, 0x40, 0x0, 0x7, 0x4, 0x3, 0xfffffffc, 0x7f, 0x9, 0x9, 0x2, 0x0, 0x8, 0x1f, 0x0, 0x7f, 0x80, 0x10000, 0x9057, 0x20, 0x4, 0x1ff, 0x7, 0x7f, 0x9, 0x3f, 0xd8e, 0x81, 0x0, 0x5, 0x941, 0x6, 0x2, 0xffffff80, 0x3, 0x0, 0x1, 0x1, 0x4, 0x5, 0x646a, 0x400, 0x1, 0x7f, 0x3, 0x9e1b, 0xfe7, 0x7, 0xf554, 0x1, 0x8, 0x5, 0x2, 0x80, 0x1ff, 0x1, 0x6d, 0x9, 0x0, 0x2d, 0x8, 0x8, 0x4, 0xffffff80, 0x9, 0x1171, 0x0, 0xffffffff, 0x8, 0x8, 0x6, 0x2fc4, 0x9, 0x0, 0x9, 0xfffffffe, 0xfffffff9, 0x7fff, 0x4, 0x4186, 0x827b, 0x20, 0x8, 0x8, 0x9, 0x9, 0xfffffc01, 0x6, 0x10001, 0x200, 0x100, 0x3, 0x7, 0x8, 0x1ff, 0xa50, 0x7, 0xbe, 0xaa0, 0x6, 0x8001, 0x17df, 0x77, 0x7, 0x23, 0x6, 0x7, 0x2, 0x7, 0x1, 0x40, 0x6, 0xffff9836, 0x1, 0x81, 0x80000001, 0x0, 0x8, 0xfffffffb, 0x7fff, 0x1, 0x9, 0x7, 0x7f, 0x9, 0x6, 0xfffffffd, 0xfffffff7, 0x6, 0x8001, 0x3f, 0x4, 0x1acecc, 0x1, 0xffff, 0xc140, 0x7c9, 0x9, 0x6, 0x3babafeb, 0xfffffffb, 0x6, 0xfffffffb, 0x401, 0x1, 0x5, 0x81, 0x4, 0xfffffffa, 0x5, 0x3c5, 0x4, 0x5, 0x6, 0x8, 0x8, 0xfffffffb, 0x4, 0x3, 0x4, 0x3f, 0xfffffbff, 0x8, 0x2, 0x5, 0x75f, 0x9, 0x4, 0x41d8, 0x4, 0x0, 0x5, 0x80000000, 0x1, 0x7fff, 0x6, 0x401, 0xfffffffa, 0x7d4d, 0xfff, 0xcec9, 0x2, 0x7, 0xb2, 0x1ff, 0x200, 0x9e3, 0x7, 0x7, 0x7fffffff, 0x80, 0x2, 0x1, 0x1, 0x8, 0x5, 0x5, 0x7fff, 0xff, 0xa5ed, 0x2, 0x4, 0x7, 0x8, 0xbb, 0x40, 0x9, 0x5, 0xde9e, 0x2ee, 0x81, 0x0, 0x6, 0xffff4fcb, 0x5, 0xabe, 0x1, 0x401, 0x40, 0x1, 0x40, 0xff, 0x0, 0xa2, 0x1, 0x5, 0x5, 0xea, 0x1ff, 0xb1f, 0xfffffff9, 0x1f, 0x7, 0x9, 0x8, 0x80, 0x2, 0x101, 0x6, 0x7fff, 0x81, 0xc64, 0x9, 0x8000, 0x0, 0x1, 0x0, 0xe6e1, 0xffff, 0x1, 0x6, 0x5, 0x2, 0x8, 0x3, 0x0, 0x4, 0xffffffff, 0x80000000, 0xa5, 0x5, 0x31, 0xe8, 0x7fffffff, 0x800, 0x8001, 0x52, 0x1, 0x3ff, 0x80, 0x8, 0x3, 0x7, 0x40, 0x81, 0xfffffffe, 0x400, 0x4658, 0x8001, 0x3f80, 0x7ff, 0xffffffff, 0x3f, 0x1ff, 0xbf1b, 0x400000, 0x2, 0x0, 0x1, 0x0, 0x7f, 0x400, 0x8, 0x63, 0x3, 0x5, 0xffff, 0x9, 0x4, 0x100, 0x2, 0x4c8, 0xfffffffb, 0xaa, 0x40, 0x9, 0x3, 0x7f, 0x8001, 0x4, 0x3ff, 0x1, 0x8, 0xffff8001, 0x7, 0x9, 0x9, 0x7fff, 0x10000, 0x23c, 0x0, 0xf89, 0x2ea8, 0x6, 0x1, 0xfffffffc, 0x3ff, 0x4c, 0x7fffffff, 0x8, 0x1, 0x40, 0x9d0, 0x3a, 0x7fffffff, 0x800, 0x9, 0x2, 0x10000, 0x7, 0x3, 0x57a3, 0x2, 0xfffffffc, 0x8398, 0x8, 0x200, 0x200, 0x0, 0x6, 0x3, 0x1f, 0x4, 0x5, 0x3, 0x0, 0x5, 0x6e9, 0x6, 0x9, 0x7, 0x20, 0xce9, 0x1, 0x7, 0x1000, 0x0, 0x6, 0x62, 0xb45d, 0x1, 0x0, 0x5, 0x3f, 0x6, 0x2, 0x5, 0x3f, 0x2, 0xad, 0x2, 0xba, 0x4, 0x6, 0x7fff, 0x9, 0x0, 0x3, 0x9c, 0x0, 0x40, 0x7fffffff, 0x0, 0x0, 0x7b92, 0x54d, 0xffffff7f, 0xd53, 0x80000000, 0x9dfa, 0x38, 0x4, 0x7, 0x8, 0x20, 0x9, 0x840, 0x3f, 0x8, 0x2, 0x400, 0x1000, 0x80000001, 0x80000000, 0x8, 0x20, 0x8, 0x2, 0x1, 0x1000, 0x3, 0x4, 0x5, 0x1000, 0x5, 0x1f, 0x7, 0xffffffff, 0xb, 0x3f, 0x1f, 0xb2, 0x2, 0x1, 0x4, 0x8001, 0x6, 0x5, 0x1, 0x0, 0x81, 0x5457, 0x7, 0x80000001, 0x7, 0x4, 0x9, 0x800, 0x1, 0x1f, 0x3, 0x1000, 0x9, 0xfffffffe, 0x2, 0x3, 0xfffffffc, 0x8, 0x7, 0x8, 0x3, 0x3, 0x7, 0x3f, 0x3f, 0x8, 0x5, 0x200, 0x0, 0x800, 0x6, 0x5, 0x5e84ff1f, 0x1ff, 0x6, 0x40, 0x6a, 0x3ff, 0x100, 0x7ff, 0x3ff, 0x1, 0x7, 0xffff, 0x5, 0x3, 0x6, 0x3ff, 0xfff, 0x1, 0x8, 0x7f, 0xa25, 0x9, 0xc3c, 0x9, 0x2, 0x5, 0x1, 0xfff, 0x6, 0x1000, 0x0, 0x3, 0x0, 0x8001, 0x7fff, 0x5, 0xae, 0x80, 0x7, 0xfffff96a, 0x5, 0x20, 0x3, 0x9, 0x9, 0x2, 0x566, 0x81, 0xfffffc40, 0x0, 0x80, 0x400, 0x6b8, 0x1, 0x4, 0x81, 0x2e, 0x7, 0x6, 0x1, 0x0, 0x0, 0x7, 0x1000, 0x2, 0x3ff, 0x64, 0x6, 0x2, 0x3, 0x8001, 0x0, 0x7, 0x8, 0x81, 0x3, 0x32, 0x0, 0x6, 0x1e49, 0x2, 0x16ed, 0x6, 0x1f, 0x1, 0xffffffff, 0x20, 0xeb7, 0xffffffff, 0x7fffffff, 0x2, 0x3af0, 0x7f, 0x4ce2, 0x3, 0x9, 0x10000, 0xfffffffa, 0x29, 0x8, 0x8, 0x4, 0x80, 0x7fffffff, 0x4, 0x80, 0x287, 0x7f, 0x58, 0x4, 0x3, 0x9, 0x2, 0x1000, 0x7fff, 0x20, 0x9, 0xfff, 0x5, 0x6, 0x0, 0x1, 0x1, 0x3, 0x0, 0xffff, 0x8, 0x1f, 0xffffffff, 0x1, 0x3, 0x1, 0x101, 0xfffffffe, 0xa0, 0x1ff, 0x9, 0x3, 0x6dc9, 0x0, 0x1ff, 0x0, 0x1, 0x6cd, 0x9, 0x0, 0x8, 0x2, 0x5, 0xc0000000, 0x7, 0xf5, 0x2, 0x0, 0x7fffffff, 0xa3e, 0x1, 0x3, 0x4d69, 0x3, 0x3, 0x0, 0x7f, 0xffff32f1, 0x1f, 0x8, 0x1, 0xffffffe0, 0x2, 0x3, 0xfffffc00, 0x5, 0xffff, 0x3, 0x9, 0x0, 0x4, 0x0, 0x0, 0x7fffffff, 0x40, 0xfffffe01, 0x9, 0xffff, 0x1, 0xfffffff9, 0x8, 0xd25, 0x75, 0x4, 0x0, 0x9, 0x6235, 0x10001, 0x5, 0x14000000, 0xffffffff, 0x3, 0x3, 0x100, 0x2, 0x0, 0xe10, 0x1, 0x1f, 0x2, 0x10000, 0x7f, 0x10001, 0x0, 0x6, 0x80000000, 0x3, 0x8, 0x9, 0x401, 0x4, 0xf21, 0x10001, 0x400, 0x8da, 0x5, 0x3, 0x8, 0x1, 0x5, 0x7, 0x3000, 0x5, 0x8000, 0x3, 0x3, 0x4, 0x7ff, 0x9, 0x4, 0x1, 0x0, 0x3ff, 0x9, 0x9, 0x200, 0x6ee7, 0x6, 0x8, 0x40, 0x2, 0x2e0, 0x2, 0x1, 0x3, 0x400000, 0xbc, 0x1000, 0x700000, 0x4, 0x2, 0x0, 0x7, 0x80010000, 0x7ff, 0x2400000, 0x2, 0x7, 0x1, 0x10000, 0xff, 0x7fff, 0x6, 0x7, 0x0, 0x8, 0x4, 0x7, 0x81, 0x1, 0x4, 0x2, 0x1f, 0x1a, 0x0, 0x3, 0xfff, 0x800, 0x5, 0x3ff, 0x1000, 0x9b, 0x3, 0x7fff, 0xcbe, 0xd5, 0x8, 0x6, 0x0, 0x3f, 0xd, 0x7, 0x3, 0x0, 0x0, 0x2, 0xffffdcdd, 0x7, 0x6, 0x7, 0x392e, 0x2, 0xa91, 0x0, 0x8, 0x200, 0xe7e, 0x200, 0x8, 0x1, 0xd4c, 0xb8e, 0x6, 0x8000, 0x508a, 0x8256, 0x800, 0x0, 0x3f, 0x80000000, 0x1b4, 0x5, 0x1, 0x3, 0xa49c, 0x5, 0x1000, 0x6, 0x7, 0x80000001, 0x9, 0xfe, 0xb05, 0x3ff, 0x2, 0x1000, 0x6, 0x5, 0x10000, 0x8, 0xffffffff, 0x4, 0x1, 0x20, 0x80000001, 0x6, 0xf4c9a2b4, 0x9, 0x0, 0x877, 0x7, 0x5, 0x4aa1, 0x7, 0x2, 0xffff7fff, 0xf1, 0x7, 0xfffffbff, 0x2, 0x9, 0x4, 0x8, 0x0, 0x0, 0x7, 0x4, 0x0, 0x1ff, 0x7, 0x7, 0xef, 0x73be, 0xffffffff, 0x2, 0xa9, 0x1, 0x5, 0x2569, 0x9c0765e, 0x8000, 0x9, 0x7, 0x9, 0xfffffffa, 0x63a, 0xc3, 0xfff, 0x9, 0xff, 0x180000, 0x0, 0x1, 0x800, 0x8000, 0xca5, 0x7adc, 0x3, 0x6, 0x1, 0x100, 0x4, 0x5, 0x300e, 0x7, 0x3a64, 0x2, 0x7fffffff, 0x1000, 0x7, 0xff, 0x1, 0xd20f, 0x9, 0x7ff, 0x20, 0x81, 0x6, 0x1ff, 0x7, 0x7, 0x5dda, 0x6, 0x3f, 0x1000, 0x6, 0x3, 0xb0a, 0x1, 0x9, 0x9, 0x579, 0x9, 0x5, 0x1, 0x5, 0x6, 0x0, 0x6, 0x80000000, 0x9, 0x100, 0x5, 0x0, 0x8000, 0x6, 0xdf5c, 0x2440, 0x81, 0x1f, 0x800, 0x3, 0x87, 0x9, 0xc302, 0xc5, 0x1, 0x6, 0x1, 0x0, 0x9, 0x9, 0x14b0c887, 0xde, 0x6b0a9509, 0x400, 0x3, 0x62, 0x8, 0x7f, 0x200, 0xd9, 0x9, 0x5, 0x6, 0xfd, 0x2, 0x8, 0x2, 0x5, 0xe58e, 0x2, 0xffff0001, 0x81, 0x40, 0x1000, 0x7fffffff, 0x6af, 0x6cff, 0x10000, 0x7, 0x2, 0x1000, 0x10000, 0xf42, 0x40, 0x7fff, 0xffff0001, 0x6, 0xffffffc0, 0xffffffff, 0x7ff, 0x6, 0x9, 0x80000001], 0x3, 0x400, 0x1}) (async, rerun: 64) sched_setparam(r5, &(0x7f00000001c0)=0x9) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r6}}, 0x30) 00:37:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0x0, 0x83, "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", 0x3f, 0x1, 0x8, 0x6, 0x1f, 0x80, 0x9}, r1}}, 0x120) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1f, @empty, 0x1}, {0xa, 0x0, 0x40000, @ipv4={'\x00', '\xff\xff', @remote}, 0x4}, r4, 0x19}}, 0x48) 00:37:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1000}, {0xa, 0x4, 0x0, @dev}, r1, 0x4}}, 0x48) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1000}, {0xa, 0x4, 0x0, @dev}, r1, 0x4}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1000}, {0xa, 0x4, 0x0, @dev}, r1, 0x4}}, 0x48) (async) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r3, 0xab, "eca91b", "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"}}, 0x110) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000400)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000003c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x4, @dev}, r5}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r5}}, 0x10) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x3, {0x9, 0x7fffffff, "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", 0x9, 0xfe, 0x67, 0x7, 0x2, 0xff, 0x3, 0xfc}, r7}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r3, 0xab, "eca91b", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000400)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000003c0)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x4, @dev}, r5}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r5}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x111, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x3, {0x9, 0x7fffffff, "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", 0x9, 0xfe, 0x67, 0x7, 0x2, 0xff, 0x3, 0xfc}, r7}}, 0x128) (async) 00:37:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0x0, 0x83, "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", 0x3f, 0x1, 0x8, 0x6, 0x1f, 0x80, 0x9}, r1}}, 0x120) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1f, @empty, 0x1}, {0xa, 0x0, 0x40000, @ipv4={'\x00', '\xff\xff', @remote}, 0x4}, r4, 0x19}}, 0x48) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x111, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r2, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) 00:37:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000000c0)={0x2, 0x3}) 00:37:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r2, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x111, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000000), r2, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) 00:37:37 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0x0, 0x83, "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", 0x3f, 0x1, 0x8, 0x6, 0x1f, 0x80, 0x9}, r1}}, 0x120) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1f, @empty, 0x1}, {0xa, 0x0, 0x40000, @ipv4={'\x00', '\xff\xff', @remote}, 0x4}, r4, 0x19}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0x0, 0x83, "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", 0x3f, 0x1, 0x8, 0x6, 0x1f, 0x80, 0x9}, r1}}, 0x120) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1f, @empty, 0x1}, {0xa, 0x0, 0x40000, @ipv4={'\x00', '\xff\xff', @remote}, 0x4}, r4, 0x19}}, 0x48) (async) 00:37:37 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="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"], 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r2, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x1c}}, 0x20040000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f00000003c0)={0x2020}, 0x2020) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r6, &(0x7f0000000780)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x5c, r2, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xe2f}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x5c}}, 0x4000080) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8898}, 0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x4000, 0x7, @dev={0xfe, 0x80, '\x00', 0x16}}, r8}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r8}}, 0x10) 00:37:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1f, r2, 0x0, 0x0, 0x1}}, 0x20) 00:37:37 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) (async, rerun: 32) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="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"], 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r2, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x1c}}, 0x20040000) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async, rerun: 32) r4 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f00000003c0)={0x2020}, 0x2020) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r6, &(0x7f0000000780)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x5c, r2, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xe2f}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x5c}}, 0x4000080) (async, rerun: 32) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) (rerun: 32) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r7, 0x1}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8898}, 0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x4000, 0x7, @dev={0xfe, 0x80, '\x00', 0x16}}, r8}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r8}}, 0x10) 00:37:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000000c0)={0x2, 0x3}) 00:37:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000000c0)={0x2, 0x3}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, r1}}, 0x30) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000000c0)={0x2, 0x3}) (async) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1f, r2, 0x0, 0x0, 0x1}}, 0x20) 00:37:37 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000)=0x1f, r2, 0x0, 0x0, 0x1}}, 0x20) 00:37:37 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000)={@empty}, &(0x7f0000000100)=0x14) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000)={@empty}, &(0x7f0000000100)=0x14) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20190000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8800) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0x8000000}}, 0x10) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'syztnl1\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="73697468b7cb8100"/20, @ANYRES32=r5, @ANYBLOB="0700002000000008000000004a6800680066000002049078000000000a0101000717bcac1414aaac141422e0000001e0000001ac141439070bc97f000001000000004424fe436401010000000800ffffffff00000001ac1414160000000800000000000000034409e86d220857bcc79404000000"]}) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r6}}, 0x48) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) (async) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000000)={@empty}, &(0x7f0000000100)=0x14) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:38 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="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"], 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r2, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x1c}}, 0x20040000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f00000003c0)={0x2020}, 0x2020) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r6, &(0x7f0000000780)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x5c, r2, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xe2f}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x5c}}, 0x4000080) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8898}, 0x8000) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x4000, 0x7, @dev={0xfe, 0x80, '\x00', 0x16}}, r8}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r8}}, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="010000000000000000000b004000bc61b8ef321d3698c6cb67382b2fd4c5e04b26746323c7619aa78ff3a9535463ac64e0e75948a5076a298ab8f9844cd1c9882c9d2d68d8397e7cd35b55ef2266a158f26f96b4c48e5a1dae009cc6b93de410235687ec16f7f75762e5edcfd60ace28622cb94a59fb82b2caf9a6b11c3c33d2c553b825a9e1fd35d9869f25aa96bac65e2c04971af6d05edacae4fc65d977730f78a249bc4560d8157a2f771645d50f58f8afb26ac9856e656970c7174bd88520e8c36a7ce4e9cbfe8afa8dde358e45e28bb04610aab2379199ef320d9fe268b7ca818bc4560ce6e61d60bf406e6971f2d2cb8d120ca2d1a88b006b5c598c564dddebd86ac5c98292438068550f900d07582edcf3147386bcf037779a8d677fb39972b090ab9f016f20306a0c88945607e82c1d81b1be93355efd17b1b4751e1ed5ff9083a5"], 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x1c, r2, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x1c}}, 0x20040000) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) (async) read$FUSE(r5, &(0x7f00000003c0)={0x2020}, 0x2020) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r6, &(0x7f0000000780)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x5c, r2, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xe2f}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x9}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x5c}}, 0x4000080) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r7, 0x1}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r7, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8898}, 0x8000) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x4000, 0x7, @dev={0xfe, 0x80, '\x00', 0x16}}, r8}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r8}}, 0x10) (async) 00:37:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20190000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8800) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0x8000000}}, 0x10) (async) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'syztnl1\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="73697468b7cb8100"/20, @ANYRES32=r5, @ANYBLOB="0700002000000008000000004a6800680066000002049078000000000a0101000717bcac1414aaac141422e0000001e0000001ac141439070bc97f000001000000004424fe436401010000000800ffffffff00000001ac1414160000000800000000000000034409e86d220857bcc79404000000"]}) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r6}}, 0x48) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00042abd7000fddb010000007f003b0000800000"], 0x24}, 0x1, 0x0, 0x0, 0x40044}, 0x4095) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x30) 00:37:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20190000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7fffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8800) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async, rerun: 64) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) (rerun: 64) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00042abd7000fddb010000007f003b0000800000"], 0x24}, 0x1, 0x0, 0x0, 0x40044}, 0x4095) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x30) 00:37:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async, rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0x8000000}}, 0x10) (async, rerun: 64) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000180)={'syztnl1\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="73697468b7cb8100"/20, @ANYRES32=r5, @ANYBLOB="0700002000000008000000004a6800680066000002049078000000000a0101000717bcac1414aaac141422e0000001e0000001ac141439070bc97f000001000000004424fe436401010000000800ffffffff00000001ac1414160000000800000000000000034409e86d220857bcc79404000000"]}) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x6}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r6}}, 0x48) 00:37:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x800, 0x0, @dev={0xfe, 0x80, '\x00', 0x4}}, r1, 0xfffffffd}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x20}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000000080)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x9}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x3bad, @mcast1, 0x8000}, r7}}, 0x38) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00042abd7000fddb010000007f003b0000800000"], 0x24}, 0x1, 0x0, 0x0, 0x40044}, 0x4095) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x30) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0xfffffe10, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1}, r1}}, 0x30) 00:37:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) 00:37:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000340)={0x6, 0x118, 0xfa00, {{0x0, 0x83, "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", 0x3f, 0x1, 0x8, 0x6, 0x1f, 0x80, 0x9}, r1}}, 0x120) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x10}}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1f, @empty, 0x1}, {0xa, 0x0, 0x40000, @ipv4={'\x00', '\xff\xff', @remote}, 0x4}, r4, 0x19}}, 0x48) 00:37:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0xfffffe10, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1}, r1}}, 0x30) 00:37:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) 00:37:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x800, 0x0, @dev={0xfe, 0x80, '\x00', 0x4}}, r1, 0xfffffffd}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x20}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000000080)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x9}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x3bad, @mcast1, 0x8000}, r7}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x800, 0x0, @dev={0xfe, 0x80, '\x00', 0x4}}, r1, 0xfffffffd}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x20}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r3, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000000080)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x9}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x111, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x3bad, @mcast1, 0x8000}, r7}}, 0x38) (async) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0xfffffe10, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0xfffffe10, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1}, r1}}, 0x30) (async) 00:37:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) 00:37:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x53472d16f3025ac7}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0x3}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x5, @mcast1, 0x1}}}, 0x38) 00:37:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x1, {0x3, 0x95, "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", 0x81, 0x0, 0x6, 0x6, 0xff, 0x2, 0x80, 0x1}, r1}}, 0x128) 00:37:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x800, 0x0, @dev={0xfe, 0x80, '\x00', 0x4}}, r1, 0xfffffffd}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x20}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000000080)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x9}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x3bad, @mcast1, 0x8000}, r7}}, 0x38) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x53472d16f3025ac7}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0x3}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x5, @mcast1, 0x1}}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x2, 0x53472d16f3025ac7}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0x3}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x5, @mcast1, 0x1}}}, 0x38) (async) 00:37:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x1, {0x3, 0x95, "a27003ddba19032b61bb418c2e88889c27f8d50c2cb42342916039228d768863bdd1f6e7fe764b4cd7054ecac78f05f0ed80bf023f067b614def5e5413699446cf53bc875e8bd2503e23a787da1ceb60dc813ce81140995c271fc6e1422ee421ec34a85d389dac3556315f19aa4dea8030703e1c15a9a8f515039df181533e1771c9e6a430d51b87e237984bd29fcf655a227060ffba4478fd2b4655d62e0f3daeb43b0aeddb5c216c00f0e05e203bac24e923b18aca3b9dc73e00dd3dedee8042b55ac160521d5b965e0174024b49bf8a68a710b770c77f6356e3d089cff290fdf3bc08aa546632e7bc565b1d40fe91db048588bf7b42896d135f2fe11b813e", 0x81, 0x0, 0x6, 0x6, 0xff, 0x2, 0x80, 0x1}, r1}}, 0x128) (rerun: 64) 00:37:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x800, 0x0, @dev={0xfe, 0x80, '\x00', 0x4}}, r1, 0xfffffffd}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x20}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r1, 0x2}}, 0x10) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r3, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000000080)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x9}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r6, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x3bad, @mcast1, 0x8000}, r7}}, 0x38) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x2, 0x53472d16f3025ac7}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000001c0)={0x7, 0x8, 0xfa00, {r3, 0x3}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x5, @mcast1, 0x1}}}, 0x38) 00:37:38 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609"}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:38 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, &(0x7f0000000000), 0x13f}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) 00:37:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:38 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x1, {0x3, 0x95, "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", 0x81, 0x0, 0x6, 0x6, 0xff, 0x2, 0x80, 0x1}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x1, {0x3, 0x95, "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", 0x81, 0x0, 0x6, 0x6, 0xff, 0x2, 0x80, 0x1}, r1}}, 0x128) (async) 00:37:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) 00:37:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x128000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x640003, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000400)) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000001c0)={'erspan0\x00', 0x8000}) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000003c0)={0x4, 0x8, 0xfa00, {r6, 0x7}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r4, 0xe82b}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r7}}, 0x48) r8 = openat$tun(0xffffffffffffff9c, 0x0, 0x404a02, 0x0) ioctl$TUNSETVNETLE(r8, 0x400454dc, &(0x7f0000000180)) 00:37:39 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'bond_slave_1\x00', 0x400}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r5}}, 0x18) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x2, @mcast1, 0x6}, r3}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) (async) 00:37:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e22, 0x8, @remote, 0x3f}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x10001, @empty, 0x9}, {0xa, 0x4e23, 0x3f, @local, 0x6}, r4, 0x4}}, 0x48) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r5) sendmsg$BATADV_CMD_TP_METER(r7, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r8, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) sendmsg$BATADV_CMD_GET_HARDIF(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00812bbd7000fedbdf2d4500000008000300", @ANYRES32=r6, @ANYBLOB="0500300000000000"], 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'gretap0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="69705f7674693000000000c6000000007628d736b46eeb97ded77823f3266734afe9659f2c0870528f0c52aa8736b598c8098e43393527777af06df40000", @ANYRES32=r6, @ANYBLOB="000111010000000700040002452400540064000008049078e00000017f00000144344b417f00000100000003ac1414aa7fffffffe0000001000000040a01010000000401ffffffff000000090a01010000001a2b86033183078e7f0000010100"]}) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x13f, 0x8}}, 0x20) (async) 00:37:39 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'bond_slave_1\x00', 0x400}) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r5}}, 0x18) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x2, @mcast1, 0x6}, r3}}, 0x38) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e22, 0x8, @remote, 0x3f}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x10001, @empty, 0x9}, {0xa, 0x4e23, 0x3f, @local, 0x6}, r4, 0x4}}, 0x48) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r5) sendmsg$BATADV_CMD_TP_METER(r7, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r8, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) sendmsg$BATADV_CMD_GET_HARDIF(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00812bbd7000fedbdf2d4500000008000300", @ANYRES32=r6, @ANYBLOB="0500300000000000"], 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'gretap0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="69705f7674693000000000c6000000007628d736b46eeb97ded77823f3266734afe9659f2c0870528f0c52aa8736b598c8098e43393527777af06df40000", @ANYRES32=r6, @ANYBLOB="000111010000000700040002452400540064000008049078e00000017f00000144344b417f00000100000003ac1414aa7fffffffe0000001000000040a01010000000401ffffffff000000090a01010000001a2b86033183078e7f0000010100"]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e22, 0x8, @remote, 0x3f}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x111, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x10001, @empty, 0x9}, {0xa, 0x4e23, 0x3f, @local, 0x6}, r4, 0x4}}, 0x48) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r5) (async) sendmsg$BATADV_CMD_TP_METER(r7, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r8, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) (async) sendmsg$BATADV_CMD_GET_HARDIF(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00812bbd7000fedbdf2d4500000008000300", @ANYRES32=r6, @ANYBLOB="0500300000000000"], 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'gretap0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="69705f7674693000000000c6000000007628d736b46eeb97ded77823f3266734afe9659f2c0870528f0c52aa8736b598c8098e43393527777af06df40000", @ANYRES32=r6, @ANYBLOB="000111010000000700040002452400540064000008049078e00000017f00000144344b417f00000100000003ac1414aa7fffffffe0000001000000040a01010000000401ffffffff000000090a01010000001a2b86033183078e7f0000010100"]}) (async) 00:37:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x128000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x640003, 0x0) (async) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000400)) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000001c0)={'erspan0\x00', 0x8000}) (rerun: 64) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000003c0)={0x4, 0x8, 0xfa00, {r6, 0x7}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r4, 0xe82b}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r7}}, 0x48) r8 = openat$tun(0xffffffffffffff9c, 0x0, 0x404a02, 0x0) ioctl$TUNSETVNETLE(r8, 0x400454dc, &(0x7f0000000180)) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) 00:37:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e22, 0x8, @remote, 0x3f}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x10001, @empty, 0x9}, {0xa, 0x4e23, 0x3f, @local, 0x6}, r4, 0x4}}, 0x48) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r8 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r5) sendmsg$BATADV_CMD_TP_METER(r7, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r8, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) sendmsg$BATADV_CMD_GET_HARDIF(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00812bbd7000fedbdf2d4500000008000300", @ANYRES32=r6, @ANYBLOB="0500300000000000"], 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'gretap0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="69705f7674693000000000c6000000007628d736b46eeb97ded77823f3266734afe9659f2c0870528f0c52aa8736b598c8098e43393527777af06df40000", @ANYRES32=r6, @ANYBLOB="000111010000000700040002452400540064000008049078e00000017f00000144344b417f00000100000003ac1414aa7fffffffe0000001000000040a01010000000401ffffffff000000090a01010000001a2b86033183078e7f0000010100"]}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r1, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e22, 0x8, @remote, 0x3f}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x111, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x10001, @empty, 0x9}, {0xa, 0x4e23, 0x3f, @local, 0x6}, r4, 0x4}}, 0x48) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r5) (async) sendmsg$BATADV_CMD_TP_METER(r7, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r8, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) (async) sendmsg$BATADV_CMD_GET_HARDIF(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00812bbd7000fedbdf2d4500000008000300", @ANYRES32=r6, @ANYBLOB="0500300000000000"], 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'gretap0\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="69705f7674693000000000c6000000007628d736b46eeb97ded77823f3266734afe9659f2c0870528f0c52aa8736b598c8098e43393527777af06df40000", @ANYRES32=r6, @ANYBLOB="000111010000000700040002452400540064000008049078e00000017f00000144344b417f00000100000003ac1414aa7fffffffe0000001000000040a01010000000401ffffffff000000090a01010000001a2b86033183078e7f0000010100"]}) (async) 00:37:39 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'bond_slave_1\x00', 0x400}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r5}}, 0x18) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e24, 0x2, @mcast1, 0x6}, r3}}, 0x38) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3, @mcast2, 0x2}, {0xa, 0x4e22, 0x0, @loopback, 0x53}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xbe18, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xfe}}, r1}}, 0x48) 00:37:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000000c0)={0x4, 0x80000000, 0x6, 0x0, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x7faf, 0x99c1, "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", 0xe4, 0x7b, 0x3, 0xff, 0x67, 0x1, 0x1, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x128000, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x640003, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000400)) (async, rerun: 64) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (rerun: 64) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040), 0x13f, 0x1}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000001c0)={'erspan0\x00', 0x8000}) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f00000003c0)={0x4, 0x8, 0xfa00, {r6, 0x7}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r4, 0xe82b}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r7}}, 0x48) r8 = openat$tun(0xffffffffffffff9c, 0x0, 0x404a02, 0x0) ioctl$TUNSETVNETLE(r8, 0x400454dc, &(0x7f0000000180)) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xbe18, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xfe}}, r1}}, 0x48) 00:37:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:39 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) (async, rerun: 64) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3, @mcast2, 0x2}, {0xa, 0x4e22, 0x0, @loopback, 0x53}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000000c0)={0x4, 0x80000000, 0x6, 0x0, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x7faf, 0x99c1, "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", 0xe4, 0x7b, 0x3, 0xff, 0x67, 0x1, 0x1, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000000c0)={0x4, 0x80000000, 0x6, 0x0, 0x8}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x7faf, 0x99c1, "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", 0xe4, 0x7b, 0x3, 0xff, 0x67, 0x1, 0x1, 0x1}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xbe18, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xfe}}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xbe18, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xfe}}, r1}}, 0x48) (async) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r3, 0x2}}, 0x18) 00:37:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3, @mcast2, 0x2}, {0xa, 0x4e22, 0x0, @loopback, 0x53}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x106, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3, @mcast2, 0x2}, {0xa, 0x4e22, 0x0, @loopback, 0x53}, r3}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:39 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000000c0)={0x4, 0x80000000, 0x6, 0x0, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x7faf, 0x99c1, "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", 0xe4, 0x7b, 0x3, 0xff, 0x67, 0x1, 0x1, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000000c0)={0x4, 0x80000000, 0x6, 0x0, 0x8}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x7faf, 0x99c1, "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", 0xe4, 0x7b, 0x3, 0xff, 0x67, 0x1, 0x1, 0x1}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) 00:37:39 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r3, 0x2}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r3, 0x2}}, 0x18) (async) 00:37:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x7fff, @dev={0xfe, 0x80, '\x00', 0x2b}}, r1}}, 0x30) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) 00:37:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r5, &(0x7f0000002780)={0x2020}, 0x2020) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002400), 0x2, 0x0) read$FUSE(r6, &(0x7f0000002780)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x10000, 0x1, r7}}}, 0x28) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r8, 0x40}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x1}}, 0x10) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r9, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002440)={0x8, 0x120, 0xfa00, {0x1, {0x6, 0x1, "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", 0x1, 0x1, 0x1, 0x7, 0x4, 0x6b, 0x3f}, r8}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r10}}, 0x48) 00:37:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000003c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r3, 0x2}}, 0x18) 00:37:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3, @mcast2, 0x2}, {0xa, 0x4e22, 0x0, @loopback, 0x53}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1, 0x400}}, 0x46) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0xfffffff9}}, 0xfffffffffffffee5) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 00:37:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x7fff, @dev={0xfe, 0x80, '\x00', 0x2b}}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) 00:37:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1, 0x400}}, 0x46) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0xfffffff9}}, 0xfffffffffffffee5) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 00:37:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1, 0x400}}, 0x46) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0xfffffff9}}, 0xfffffffffffffee5) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1, 0x400}}, 0x46) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0xfffffff9}}, 0xfffffffffffffee5) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) (async) 00:37:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x7fff, @dev={0xfe, 0x80, '\x00', 0x2b}}, r1}}, 0x30) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x7fff, @dev={0xfe, 0x80, '\x00', 0x2b}}, r1}}, 0x30) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r4}}, 0x18) (async) 00:37:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3, @mcast2, 0x2}, {0xa, 0x4e22, 0x0, @loopback, 0x53}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x9}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x1, {0x1, 0xcd, "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", 0x3, 0x4, 0x40, 0x0, 0x5, 0x0, 0xfb, 0x1}, r1}}, 0x128) 00:37:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r5, &(0x7f0000002780)={0x2020}, 0x2020) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002400), 0x2, 0x0) read$FUSE(r6, &(0x7f0000002780)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x10000, 0x1, r7}}}, 0x28) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r8, 0x40}}, 0x10) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x1}}, 0x10) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r9, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002440)={0x8, 0x120, 0xfa00, {0x1, {0x6, 0x1, "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", 0x1, 0x1, 0x1, 0x7, 0x4, 0x6b, 0x3f}, r8}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r10}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x13f, 0x9}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) read$FUSE(r5, &(0x7f0000002780)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002400), 0x2, 0x0) (async) read$FUSE(r6, &(0x7f0000002780)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020}, 0x2020) (async) write$FUSE_LK(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x10000, 0x1, r7}}}, 0x28) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x13f, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r8, 0x40}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x1}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r9, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002440)={0x8, 0x120, 0xfa00, {0x1, {0x6, 0x1, "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", 0x1, 0x1, 0x1, 0x7, 0x4, 0x6b, 0x3f}, r8}}, 0x128) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r10}}, 0x48) (async) 00:37:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x9}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x1, {0x1, 0xcd, "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", 0x3, 0x4, 0x40, 0x0, 0x5, 0x0, 0xfb, 0x1}, r1}}, 0x128) 00:37:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000180), 0xfffffffffffffffb, 0x82000) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000480), r4, 0x1}}, 0x18) read$FUSE(r3, &(0x7f0000002780)={0x2020}, 0x2020) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x3, r5, 0x1c, 0x1, @in6={0xa, 0x4e22, 0xbe, @ipv4={'\x00', '\xff\xff', @remote}, 0x4}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x81}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d581fd205b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e671731160900", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1}, r1}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r1, 0xa}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r7, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r5, r3}}, 0xffffff31) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r9, 0x7ab, &(0x7f0000000340)={&(0x7f0000000840)={{@local, 0x2}, {@my=0x0, 0x8}, 0x400, "a414d55399e52e5ba0fe89c47117ca3d9a43479515abe6f9465a36c40f5d2342fcc7363f257fb64e405a62cd90fbe2f0f8c86dddcd100cf3b89608debd9f56f887f62da9330ddea3a8164a2fbfdedafaa507ef77b371c610655342582edd28a21a75fe0c2db41d969750d3cb145a825f0df82bcfec8fda1f409b0328e0d8fa8d3586a0a963c432ce27a51ed1e7d2c33e8c88455640d4021ac7b15446ff4a15635e115fa892d67b37163a11ea1aad04f7308fbf982c29895d1ab6eb25de4a8c220278c4b6cb4e894e637585c479cb99263e9c9e8af6937530fd571b1cb9dd4def35e144e61021449fb80752b0ba6591626248940e8577661eaa998435937f12dc737032f3097d8734f7ea28d0c36ea9c7a9030729deedc8a3044220bc553ce2140b7513af183f38bede4c031235c0498294bc93fa0f0047125011ea94b324133242201937eca9e30f6c42a7c324864584eb164e732578e0ae2214c3df792d4ffdb7f227996eb888a866e4468faed80d0ad5f52183ecc2010e53c4bcfa802859c26feb82c94b238117b972126a44114416af8015fb5551b05e5019b9fc4e00ac4b58389bfa9cad04925bf86dd67845a3d98ee2e3cbfce4b62bc5045e4450b1ccd2810727f90d16d1efda4ec6313513872f3755d5eede89cebb66941999c66b008649e06ac0b677a640538251d4a1be0ac572e671dd7a3794987d643ad45d7f47d47d1b9b50b991099d81573256399877c72c188403d6851aeb0641962b358ebe599d27333cfe32fd772b3f0a7ac4fac2db7effd7ea8a3c1b25a9e47ecb32e508615954ec71a6040cdd8ce9aa6eceee6693ffbb56e99423ec909dc1bfafad0a51e998c16ae85953d380acabd835f6436ae941ff883c4554b2ce029da855ecd11a0ad10b344703a2104269b6914cf66219528bddc84fda57173aadc251d0099a0acc0ddc29490833f559749a4879db29fb515347b04f6b62be6ae69e519cb3a1e8bd4f8dee10801a7a4d7c98cf729fd311d9cbadd71489e835118bde77a7092fa1bcb5d7fe38b31158f6608466006c89aa8c0e8e36ab94b8926ef2a8c9501eb62169d6d18e04b3f66faad38f4e5482617777643db4c77942ee23536d7c11a1c6ba7940f0cf50525fd37d618c050ff6cfb4fdf63bb12acf7363fbcf465cc45811e9f7bcc3e5e80ccfdcd42dfc943830c3486baaee6271e80d22b676101f3eede1cbda0331ae5f671b58e37ac591821d56d1faed9fea48d522f7d7c3cd682e71d958765f54aea17b7d13901b05b0de153554aec7640644484ab56053534a45700a955c73a514b5f9be67847c558575564f1ef5e25c504fc1e9e2176d3879c1a62a27b3447ae11e07f30a254e2c2d0074c1abbdb27110dbd38228ce123893509bf99681c54d7722370bffee839d48bcb84d46503ccad3548a6470a80f1a81b50118d502"}, 0xff41, 0x40}) connect$vsock_dgram(r9, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @loopback}, r8}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x1}}, 0x20) 00:37:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x9}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x1, {0x1, 0xcd, "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", 0x3, 0x4, 0x40, 0x0, 0x5, 0x0, 0xfb, 0x1}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x9}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x1, {0x1, 0xcd, "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", 0x3, 0x4, 0x40, 0x0, 0x5, 0x0, 0xfb, 0x1}, r1}}, 0x128) (async) 00:37:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r5, &(0x7f0000002780)={0x2020}, 0x2020) (async) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002400), 0x2, 0x0) read$FUSE(r6, &(0x7f0000002780)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LK(r4, &(0x7f00000002c0)={0x28, 0x0, 0x0, {{0x8, 0x10000, 0x1, r7}}}, 0x28) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r8, 0x40}}, 0x10) (async) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x1}}, 0x10) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r9, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002440)={0x8, 0x120, 0xfa00, {0x1, {0x6, 0x1, "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", 0x1, 0x1, 0x1, 0x7, 0x4, 0x6b, 0x3f}, r8}}, 0x128) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r10}}, 0x48) 00:37:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3, @mcast2, 0x2}, {0xa, 0x4e22, 0x0, @loopback, 0x53}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r1, 0x30, 0x0, @ib={0x1b, 0x5, 0xcd36, {"d094f51d0635006cb30fa97c9d6b19e1"}, 0x1, 0xc4, 0x100000000}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000180), 0xfffffffffffffffb, 0x82000) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000480), r4, 0x1}}, 0x18) read$FUSE(r3, &(0x7f0000002780)={0x2020}, 0x2020) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x3, r5, 0x1c, 0x1, @in6={0xa, 0x4e22, 0xbe, @ipv4={'\x00', '\xff\xff', @remote}, 0x4}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x81}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:40 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3, @mcast2, 0x2}, {0xa, 0x4e22, 0x0, @loopback, 0x53}, r3}}, 0x48) 00:37:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000500)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000580)={0x10, 0x30, 0xfa00, {&(0x7f00000004c0), 0x0, {0xa, 0x4e20, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6}, r4}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x8}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, r1}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x0, {0xa, 0x4e24, 0xef8d, @empty}}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x2, {0x5ed7b6c9, 0x35, "1a0c745cb63140fcb6e2e710cb4aa257d952c1c2aa287545a0ad1b0833418946887e62e9783db972c65efe51646970329dc09427c47afeba46d872157020d5817a15bae1079babbca1935a2fe407e69bbf306b8f98cf3260904cb8b3b7394423709b2d43ad62cc5411a59e24a55de2692ca94722604e441a48fe4f48a48f7640c5c05a1af44e6bdc8390d92fa440f50bd3b3a1a012e8e32a5f7cef39d6cbc1f67a362e16ec7cf88682dc400019b2c70ea6e10f0a792776980bf8aa7949b0f74701f85cd31b0cb45f837490f6a56a78f2670c577cf7927831b34e4606c95c633a8c2fa19e342974391446b50d3afe938778d6a3a7f500f15c80280b8672acbf52", 0x30, 0x6, 0x3, 0x3, 0x7, 0x7f, 0x4}, r1}}, 0x128) 00:37:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r1, 0x30, 0x0, @ib={0x1b, 0x5, 0xcd36, {"d094f51d0635006cb30fa97c9d6b19e1"}, 0x1, 0xc4, 0x100000000}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r1, 0x30, 0x0, @ib={0x1b, 0x5, 0xcd36, {"d094f51d0635006cb30fa97c9d6b19e1"}, 0x1, 0xc4, 0x100000000}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:40 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d581fd205b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e671731160900", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1}, r1}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r1, 0xa}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r7, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r5, r3}}, 0xffffff31) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r9, 0x7ab, &(0x7f0000000340)={&(0x7f0000000840)={{@local, 0x2}, {@my=0x0, 0x8}, 0x400, "a414d55399e52e5ba0fe89c47117ca3d9a43479515abe6f9465a36c40f5d2342fcc7363f257fb64e405a62cd90fbe2f0f8c86dddcd100cf3b89608debd9f56f887f62da9330ddea3a8164a2fbfdedafaa507ef77b371c610655342582edd28a21a75fe0c2db41d969750d3cb145a825f0df82bcfec8fda1f409b0328e0d8fa8d3586a0a963c432ce27a51ed1e7d2c33e8c88455640d4021ac7b15446ff4a15635e115fa892d67b37163a11ea1aad04f7308fbf982c29895d1ab6eb25de4a8c220278c4b6cb4e894e637585c479cb99263e9c9e8af6937530fd571b1cb9dd4def35e144e61021449fb80752b0ba6591626248940e8577661eaa998435937f12dc737032f3097d8734f7ea28d0c36ea9c7a9030729deedc8a3044220bc553ce2140b7513af183f38bede4c031235c0498294bc93fa0f0047125011ea94b324133242201937eca9e30f6c42a7c324864584eb164e732578e0ae2214c3df792d4ffdb7f227996eb888a866e4468faed80d0ad5f52183ecc2010e53c4bcfa802859c26feb82c94b238117b972126a44114416af8015fb5551b05e5019b9fc4e00ac4b58389bfa9cad04925bf86dd67845a3d98ee2e3cbfce4b62bc5045e4450b1ccd2810727f90d16d1efda4ec6313513872f3755d5eede89cebb66941999c66b008649e06ac0b677a640538251d4a1be0ac572e671dd7a3794987d643ad45d7f47d47d1b9b50b991099d81573256399877c72c188403d6851aeb0641962b358ebe599d27333cfe32fd772b3f0a7ac4fac2db7effd7ea8a3c1b25a9e47ecb32e508615954ec71a6040cdd8ce9aa6eceee6693ffbb56e99423ec909dc1bfafad0a51e998c16ae85953d380acabd835f6436ae941ff883c4554b2ce029da855ecd11a0ad10b344703a2104269b6914cf66219528bddc84fda57173aadc251d0099a0acc0ddc29490833f559749a4879db29fb515347b04f6b62be6ae69e519cb3a1e8bd4f8dee10801a7a4d7c98cf729fd311d9cbadd71489e835118bde77a7092fa1bcb5d7fe38b31158f6608466006c89aa8c0e8e36ab94b8926ef2a8c9501eb62169d6d18e04b3f66faad38f4e5482617777643db4c77942ee23536d7c11a1c6ba7940f0cf50525fd37d618c050ff6cfb4fdf63bb12acf7363fbcf465cc45811e9f7bcc3e5e80ccfdcd42dfc943830c3486baaee6271e80d22b676101f3eede1cbda0331ae5f671b58e37ac591821d56d1faed9fea48d522f7d7c3cd682e71d958765f54aea17b7d13901b05b0de153554aec7640644484ab56053534a45700a955c73a514b5f9be67847c558575564f1ef5e25c504fc1e9e2176d3879c1a62a27b3447ae11e07f30a254e2c2d0074c1abbdb27110dbd38228ce123893509bf99681c54d7722370bffee839d48bcb84d46503ccad3548a6470a80f1a81b50118d502"}, 0xff41, 0x40}) (async, rerun: 32) connect$vsock_dgram(r9, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @loopback}, r8}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x1}}, 0x20) 00:37:40 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) syz_open_dev$loop(&(0x7f0000000180), 0xfffffffffffffffb, 0x82000) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000001c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000480), r4, 0x1}}, 0x18) (async) read$FUSE(r3, &(0x7f0000002780)={0x2020}, 0x2020) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x3, r5, 0x1c, 0x1, @in6={0xa, 0x4e22, 0xbe, @ipv4={'\x00', '\xff\xff', @remote}, 0x4}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x81}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:40 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000500)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000580)={0x10, 0x30, 0xfa00, {&(0x7f00000004c0), 0x0, {0xa, 0x4e20, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6}, r4}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x8}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, r1}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x0, {0xa, 0x4e24, 0xef8d, @empty}}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x2, {0x5ed7b6c9, 0x35, "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", 0x30, 0x6, 0x3, 0x3, 0x7, 0x7f, 0x4}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000500), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000580)={0x10, 0x30, 0xfa00, {&(0x7f00000004c0), 0x0, {0xa, 0x4e20, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6}, r4}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x2, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x8}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x0, {0xa, 0x4e24, 0xef8d, @empty}}}, 0x38) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x2, {0x5ed7b6c9, 0x35, "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", 0x30, 0x6, 0x3, 0x3, 0x7, 0x7f, 0x4}, r1}}, 0x128) (async) 00:37:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) 00:37:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r1, 0x30, 0x0, @ib={0x1b, 0x5, 0xcd36, {"d094f51d0635006cb30fa97c9d6b19e1"}, 0x1, 0xc4, 0x100000000}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x1, r1, 0x30, 0x0, @ib={0x1b, 0x5, 0xcd36, {"d094f51d0635006cb30fa97c9d6b19e1"}, 0x1, 0xc4, 0x100000000}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xd}}, {0xa, 0x0, 0x0, @local, 0x9}, r2, 0x4}}, 0x48) 00:37:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000500)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000580)={0x10, 0x30, 0xfa00, {&(0x7f00000004c0), 0x0, {0xa, 0x4e20, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x6}, r4}}, 0x38) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f00000003c0), r5, 0x8}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x0, {0xa, 0x4e24, 0xef8d, @empty}}}, 0x38) (async) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000000)={0x8, 0x120, 0xfa00, {0x2, {0x5ed7b6c9, 0x35, "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", 0x30, 0x6, 0x3, 0x3, 0x7, 0x7f, 0x4}, r1}}, 0x128) 00:37:41 executing program 5: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x2, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @remote}}}, 0xa0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r2, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xd}}, {0xa, 0x0, 0x0, @local, 0x9}, r2, 0x4}}, 0x48) 00:37:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) 00:37:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async, rerun: 64) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d581fd205b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e671731160900", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1}, r1}}, 0x128) (async, rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r1, 0xa}}, 0x10) (rerun: 32) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r7, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000140), r5, r3}}, 0xffffff31) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (rerun: 32) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r9, 0x7ab, &(0x7f0000000340)={&(0x7f0000000840)={{@local, 0x2}, {@my=0x0, 0x8}, 0x400, "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"}, 0xff41, 0x40}) (async) connect$vsock_dgram(r9, &(0x7f0000000280)={0x28, 0x0, 0x0, @host}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xfffffffc, @loopback}, r8}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x1}}, 0x20) 00:37:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r4, 0x3c, 0x0, @in6={0xa, 0x4e24, 0x80, @private0, 0x4}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:41 executing program 5: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x2, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @remote}}}, 0xa0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r2, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x2, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @remote}}}, 0xa0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) add_key$keyring(&(0x7f0000000080), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) (async) keyctl$unlink(0x9, r2, 0xfffffffffffffffe) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xd}}, {0xa, 0x0, 0x0, @local, 0x9}, r2, 0x4}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xd}}, {0xa, 0x0, 0x0, @local, 0x9}, r2, 0x4}}, 0x48) (async) 00:37:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) 00:37:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:41 executing program 5: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x2, 0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @remote}}}, 0xa0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x9, r2, 0xfffffffffffffffe) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:41 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x28, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 00:37:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r4, 0x3c, 0x0, @in6={0xa, 0x4e24, 0x80, @private0, 0x4}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r4, 0x3c, 0x0, @in6={0xa, 0x4e24, 0x80, @private0, 0x4}}}, 0x90) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) 00:37:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1, 0x8000000}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) 00:37:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) 00:37:41 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x28, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 00:37:41 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0xc4c}}}, 0x90) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f00000003c0)={0xa, 0x4, 0xfa00, {r6}}, 0xc) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r4, 0x4008af23, 0x0) ioctl$SNDCTL_DSP_STEREO(r4, 0xc0045003, &(0x7f0000000140)=0x1) openat$vmci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xfffffffb, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3d}}, 0x80000000}, {0xa, 0x4e22, 0x8, @rand_addr=' \x01\x00', 0x800}, r3, 0xff}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:41 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x28, r0, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 00:37:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1, 0x8000000}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1, 0x8000000}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) (async) 00:37:41 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) 00:37:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r4, 0x3c, 0x0, @in6={0xa, 0x4e24, 0x80, @private0, 0x4}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r4, 0x3c, 0x0, @in6={0xa, 0x4e24, 0x80, @private0, 0x4}}}, 0x90) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) 00:37:42 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f00000001c0)={0x0, 0x7}, 0x2) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x82, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000240)=r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x333}}, 0x20) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r5, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0x24, r5, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004041}, 0x800) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x6}}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="07010000", @ANYRES16=r6, @ANYBLOB="010000000000000000000b000000"], 0x14}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000580)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x44, r6, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6d}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x20000000) syz_open_dev$loop(&(0x7f00000006c0), 0x1000, 0x200000) 00:37:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) 00:37:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0xc4c}}}, 0x90) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) (rerun: 64) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f00000003c0)={0xa, 0x4, 0xfa00, {r6}}, 0xc) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r4, 0x4008af23, 0x0) ioctl$SNDCTL_DSP_STEREO(r4, 0xc0045003, &(0x7f0000000140)=0x1) openat$vmci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xfffffffb, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3d}}, 0x80000000}, {0xa, 0x4e22, 0x8, @rand_addr=' \x01\x00', 0x800}, r3, 0xff}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:42 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, 0x0) (async) write$USERIO_CMD_REGISTER(r0, &(0x7f00000001c0)={0x0, 0x7}, 0x2) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x82, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000240)=r0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x333}}, 0x20) (async, rerun: 32) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r5, 0x1}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0x24, r5, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004041}, 0x800) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) (rerun: 64) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x6}}, 0x18) (async) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="07010000", @ANYRES16=r6, @ANYBLOB="010000000000000000000b000000"], 0x14}}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000580)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x44, r6, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6d}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x20000000) (async, rerun: 32) syz_open_dev$loop(&(0x7f00000006c0), 0x1000, 0x200000) (rerun: 32) 00:37:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1, 0x8000000}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1, 0x8000000}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) (async) 00:37:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e20, 0x40, @empty, 0x9}, r3}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r5}}, 0x48) 00:37:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 00:37:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:42 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f00000001c0)={0x0, 0x7}, 0x2) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x82, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000240)=r0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x333}}, 0x20) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r5, 0x1}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0x24, r5, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004041}, 0x800) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x6}}, 0x18) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="07010000", @ANYRES16=r6, @ANYBLOB="010000000000000000000b000000"], 0x14}}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000580)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r4, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x44, r6, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6d}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x20000000) (async) syz_open_dev$loop(&(0x7f00000006c0), 0x1000, 0x200000) 00:37:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0xc4c}}}, 0x90) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f00000003c0)={0xa, 0x4, 0xfa00, {r6}}, 0xc) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r4, 0x4008af23, 0x0) ioctl$SNDCTL_DSP_STEREO(r4, 0xc0045003, &(0x7f0000000140)=0x1) openat$vmci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xfffffffb, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3d}}, 0x80000000}, {0xa, 0x4e22, 0x8, @rand_addr=' \x01\x00', 0x800}, r3, 0xff}}, 0x48) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x4e22, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0xc4c}}}, 0x90) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x13f, 0x9}}, 0x20) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000340), 0x0, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r5, &(0x7f00000003c0)={0xa, 0x4, 0xfa00, {r6}}, 0xc) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r4, 0x4008af23, 0x0) (async) ioctl$SNDCTL_DSP_STEREO(r4, 0xc0045003, &(0x7f0000000140)=0x1) (async) openat$vmci(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xfffffffb, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3d}}, 0x80000000}, {0xa, 0x4e22, 0x8, @rand_addr=' \x01\x00', 0x800}, r3, 0xff}}, 0x48) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) 00:37:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x36f}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r4, 0xf7, "7963ee", "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"}}, 0x110) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), 0xffffffffffffffff, 0x1}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000700), r7, 0x3f}}, 0x18) 00:37:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 00:37:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e20, 0x40, @empty, 0x9}, r3}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r5}}, 0x48) 00:37:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) 00:37:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async, rerun: 32) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async, rerun: 32) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e20, 0x40, @empty, 0x9}, r3}}, 0x38) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r5}}, 0x48) 00:37:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) 00:37:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x36f}}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r4, 0xf7, "7963ee", "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"}}, 0x110) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r1, 0x4}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), 0xffffffffffffffff, 0x1}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000700), r7, 0x3f}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x36f}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r4, 0xf7, "7963ee", "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"}}, 0x110) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r1, 0x4}}, 0x10) (async) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), 0xffffffffffffffff, 0x1}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000700), r7, 0x3f}}, 0x18) (async) 00:37:42 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) 00:37:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:42 executing program 1: ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000000c0)={'veth1_to_batadv\x00'}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4200c2) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000180)={{0x3, 0x3, 0x7, 0x0, 0x400000}, 0x3, 0x8, 'id1\x00', 'timer1\x00', 0x0, 0xf013, 0x0, 0x6, 0x79}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 00:37:42 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1000, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0xce23, 0x40000, @empty, 0x3b3}, {0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000002400)={0x6, 0x118, 0xfa00, {{0x91, 0x6, "6049922cb9c246b9f9393f9225bdcd7f214e0827247d53c2f8a7f4e7c339d57e6947ba1e214ffa844daa9261ae4a6c0de83ff87c1f4e4aa428d075061943a41f8076aa4daa75d7d57bcca5d7d6a260ed04d4bc3ba7ccd1a2dbf764db730fead20cf8f80f9f3410d282aa2b457fb77c86806a12fc8a2aabf9f2c45d06eb1a4017c1d0940df09921f0bbf3142c66414e40059b27f8891a050dd44b21b445a3ca71882edf1568b5283b0a9667e03d3f320121f0bee070910d5b1dde4d86f01963803a66bd54b9b25b60c7d53c915a13e254940ac015c2c3f50086a30a1ff6cceade7a9cc6d9699646cf0aefb3d4e868d8585f7abd527e547f40ebdfc4bc84050579", 0x7f, 0x6, 0x1, 0x4, 0x81, 0x0, 0x80, 0x1}, r3}}, 0x120) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) read$FUSE(0xffffffffffffffff, &(0x7f00000068c0)={0x2020, 0x0, 0x0}, 0xfffffe4e) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xffffffffffffffda, r9, {0xd0}}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f00000047c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000100)={0xa0, 0xfffffffffffffffe, r10, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, r10, {0xffff}}, 0x18) 00:37:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x36f}}, 0x10) (async, rerun: 32) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r4, 0xf7, "7963ee", "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"}}, 0x110) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000280)={0x4, 0x8, 0xfa00, {r1, 0x4}}, 0x10) (async) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), 0xffffffffffffffff, 0x1}}, 0x18) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000700), r7, 0x3f}}, 0x18) 00:37:42 executing program 1: ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000000c0)={'veth1_to_batadv\x00'}) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:42 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r0}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r0, 0x1}}, 0x48) 00:37:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4200c2) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000180)={{0x3, 0x3, 0x7, 0x0, 0x400000}, 0x3, 0x8, 'id1\x00', 'timer1\x00', 0x0, 0xf013, 0x0, 0x6, 0x79}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4200c2) (async) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000180)={{0x3, 0x3, 0x7, 0x0, 0x400000}, 0x3, 0x8, 'id1\x00', 'timer1\x00', 0x0, 0xf013, 0x0, 0x6, 0x79}) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) (async) 00:37:42 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r0}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r0, 0x1}}, 0x48) 00:37:42 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r0}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r0, 0x1}}, 0x48) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:43 executing program 1: ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000000c0)={'veth1_to_batadv\x00'}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1000, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0xce23, 0x40000, @empty, 0x3b3}, {0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, r1}}, 0x48) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000002400)={0x6, 0x118, 0xfa00, {{0x91, 0x6, "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", 0x7f, 0x6, 0x1, 0x4, 0x81, 0x0, 0x80, 0x1}, r3}}, 0x120) (rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) (async, rerun: 32) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x2}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) read$FUSE(0xffffffffffffffff, &(0x7f00000068c0)={0x2020, 0x0, 0x0}, 0xfffffe4e) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xffffffffffffffda, r9, {0xd0}}, 0x18) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000047c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000100)={0xa0, 0xfffffffffffffffe, r10, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, r10, {0xffff}}, 0x18) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4200c2) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000180)={{0x3, 0x3, 0x7, 0x0, 0x400000}, 0x3, 0x8, 'id1\x00', 'timer1\x00', 0x0, 0xf013, 0x0, 0x6, 0x79}) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x4200c2) (async) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000180)={{0x3, 0x3, 0x7, 0x0, 0x400000}, 0x3, 0x8, 'id1\x00', 'timer1\x00', 0x0, 0xf013, 0x0, 0x6, 0x79}) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) (async) 00:37:43 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x30) 00:37:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r3) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r6, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r8, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r9, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r7, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r9, 0x100, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0xc004) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x2004c080) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) (async, rerun: 64) r2 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) (async, rerun: 64) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r3) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r6, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) (async) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) (async, rerun: 64) r7 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r8, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r9, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r7, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r9, 0x100, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0xc004) (async) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x2004c080) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:43 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async, rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x30) (rerun: 32) 00:37:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r3) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r6, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r8, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r9, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r7, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r9, 0x100, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0xc004) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x2004c080) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r3) (async) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r6, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) (async) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r8, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r9, 0x1}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_DAT_CACHE(r7, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r9, 0x100, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0xc004) (async) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x2004c080) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) 00:37:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1000, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0xce23, 0x40000, @empty, 0x3b3}, {0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000002400)={0x6, 0x118, 0xfa00, {{0x91, 0x6, "6049922cb9c246b9f9393f9225bdcd7f214e0827247d53c2f8a7f4e7c339d57e6947ba1e214ffa844daa9261ae4a6c0de83ff87c1f4e4aa428d075061943a41f8076aa4daa75d7d57bcca5d7d6a260ed04d4bc3ba7ccd1a2dbf764db730fead20cf8f80f9f3410d282aa2b457fb77c86806a12fc8a2aabf9f2c45d06eb1a4017c1d0940df09921f0bbf3142c66414e40059b27f8891a050dd44b21b445a3ca71882edf1568b5283b0a9667e03d3f320121f0bee070910d5b1dde4d86f01963803a66bd54b9b25b60c7d53c915a13e254940ac015c2c3f50086a30a1ff6cceade7a9cc6d9699646cf0aefb3d4e868d8585f7abd527e547f40ebdfc4bc84050579", 0x7f, 0x6, 0x1, 0x4, 0x81, 0x0, 0x80, 0x1}, r3}}, 0x120) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r3}}, 0xc) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x2}}, 0x20) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000068c0)={0x2020, 0x0, 0x0}, 0xfffffe4e) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xffffffffffffffda, r9, {0xd0}}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f00000047c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000100)={0xa0, 0xfffffffffffffffe, r10, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x0, r10, {0xffff}}, 0x18) 00:37:43 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x30) (async) 00:37:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000040)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r1}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) 00:37:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$IOCTL_VMCI_GET_CONTEXT_ID(r1, 0x7b3, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r2, 0x1}}, 0x18) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:43 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r1, 0x13}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) keyctl$reject(0x13, 0x0, 0x8, 0x1ff, 0xfffffffffffffffd) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r3, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @empty}, {0xa, 0xfffd, 0xe4, @dev={0xfe, 0x80, '\x00', 0x14}}, r1}}, 0x48) 00:37:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x100, @private1, 0xb}, {0xa, 0x4e20, 0x5, @local, 0x400}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x0, {0xa, 0x4e24, 0x200, @loopback, 0x5}, r2}}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0xf2040, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r2, 0xfffffff7}}, 0x10) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000000)={0x15, 0x110, 0xfa00, {r1, 0x8d6e, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @empty}, @ib={0x1b, 0x669, 0x0, {"658d96437b9e3bdb54cfe4b864e43fc8"}, 0x8, 0x7, 0x8}}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xfffe, 0x0, @dev}, r1}}, 0x48) 00:37:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x0, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$IOCTL_VMCI_GET_CONTEXT_ID(r1, 0x7b3, &(0x7f0000000100)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, r2}}, 0x30) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r2, 0x1}}, 0x18) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:43 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$vmci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$IOCTL_VMCI_GET_CONTEXT_ID(r1, 0x7b3, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, r2}}, 0x30) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r2, 0x1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$vmci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) ioctl$IOCTL_VMCI_GET_CONTEXT_ID(r1, 0x7b3, &(0x7f0000000100)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, r2}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r2, 0x1}}, 0x18) (async) 00:37:43 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000000)={0x15, 0x110, 0xfa00, {r1, 0x8d6e, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @empty}, @ib={0x1b, 0x669, 0x0, {"658d96437b9e3bdb54cfe4b864e43fc8"}, 0x8, 0x7, 0x8}}}, 0x118) (async, rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xfffe, 0x0, @dev}, r1}}, 0x48) (rerun: 32) 00:37:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x100, @private1, 0xb}, {0xa, 0x4e20, 0x5, @local, 0x400}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x0, {0xa, 0x4e24, 0x200, @loopback, 0x5}, r2}}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0xf2040, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r2, 0xfffffff7}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x100, @private1, 0xb}, {0xa, 0x4e20, 0x5, @local, 0x400}}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x0, {0xa, 0x4e24, 0x200, @loopback, 0x5}, r2}}, 0x38) (async) openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0xf2040, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r2, 0xfffffff7}}, 0x10) (async) 00:37:43 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r1, 0x13}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async, rerun: 32) keyctl$reject(0x13, 0x0, 0x8, 0x1ff, 0xfffffffffffffffd) (async, rerun: 32) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r3, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @empty}, {0xa, 0xfffd, 0xe4, @dev={0xfe, 0x80, '\x00', 0x14}}, r1}}, 0x48) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000000)={0x15, 0x110, 0xfa00, {r1, 0x8d6e, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @empty}, @ib={0x1b, 0x669, 0x0, {"658d96437b9e3bdb54cfe4b864e43fc8"}, 0x8, 0x7, 0x8}}}, 0x118) (async, rerun: 32) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0xfffe, 0x0, @dev}, r1}}, 0x48) (rerun: 32) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r1, 0x9, "882bff", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) 00:37:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r1, 0x13}}, 0x10) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) keyctl$reject(0x13, 0x0, 0x8, 0x1ff, 0xfffffffffffffffd) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {r3, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x0, @empty}, {0xa, 0xfffd, 0xe4, @dev={0xfe, 0x80, '\x00', 0x14}}, r1}}, 0x48) 00:37:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x0, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x100, @private1, 0xb}, {0xa, 0x4e20, 0x5, @local, 0x400}}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x0, {0xa, 0x4e24, 0x200, @loopback, 0x5}, r2}}, 0x38) openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0xf2040, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r2, 0xfffffff7}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x100, @private1, 0xb}, {0xa, 0x4e20, 0x5, @local, 0x400}}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @remote}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x0, {0xa, 0x4e24, 0x200, @loopback, 0x5}, r2}}, 0x38) (async) openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0xf2040, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r2, 0xfffffff7}}, 0x10) (async) 00:37:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r1, 0x9, "882bff", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0xffffffffffffffda, 0x0, {0x8, 0x0, 0xfff}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r1, 0x9, "882bff", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0), 0x2, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r1, 0x9, "882bff", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x30) (async) 00:37:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0xffffffffffffffda, 0x0, {0x8, 0x0, 0xfff}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0xffffffffffffffda, 0x0, {0x8, 0x0, 0xfff}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x7fff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002780)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f0000000000)={0x90, 0xffffffffffffffda, r3, {0x6, 0x3, 0x3, 0x8, 0x7fffffff, 0x85, {0x3, 0x4, 0x100000000, 0x7, 0x100000001, 0x0, 0xfffffffa, 0x81, 0x5, 0x1000, 0x8, 0xffffffffffffffff, 0xee01, 0x2, 0x1}}}, 0x90) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r5, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r5, &(0x7f00000047c0)={0xa0, 0x0, r6, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_WRITE(r4, &(0x7f0000000100)={0x18, 0x0, r6}, 0x18) 00:37:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r4, 0xc4, "60b7d5", "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"}}, 0x110) modify_ldt$write2(0x11, &(0x7f0000000040)={0x9935c1bc, 0x20000800, 0x1000, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x6a, 0x1, "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", 0x4, 0x1, 0x7, 0x4, 0xe0, 0x7f, 0x3, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x0, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$FUSE_IOCTL(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0xffffffffffffffda, 0x0, {0x8, 0x0, 0xfff}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x7fff}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002780)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f0000000000)={0x90, 0xffffffffffffffda, r3, {0x6, 0x3, 0x3, 0x8, 0x7fffffff, 0x85, {0x3, 0x4, 0x100000000, 0x7, 0x100000001, 0x0, 0xfffffffa, 0x81, 0x5, 0x1000, 0x8, 0xffffffffffffffff, 0xee01, 0x2, 0x1}}}, 0x90) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r5, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r5, &(0x7f00000047c0)={0xa0, 0x0, r6, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) (async) write$FUSE_WRITE(r4, &(0x7f0000000100)={0x18, 0x0, r6}, 0x18) 00:37:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x6a, 0x1, "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", 0x4, 0x1, 0x7, 0x4, 0xe0, 0x7f, 0x3, 0x1}, r4}}, 0x120) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x6a, 0x1, "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", 0x4, 0x1, 0x7, 0x4, 0xe0, 0x7f, 0x3, 0x1}, r4}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) 00:37:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r4, 0xc4, "60b7d5", "19a147626f9bb85ccf7efc2f62d08194319ae75f1f42ba64e01e27916a57be40c45db2110c22376b38982255e3c6e93b88e5b61d049af8ac680bcf7bc2f14767ce0e4209f02bca4d3e4662661344d5bf020dbc7d735ff6fc87dfdacd29959fd623ef43937bc987f66558c3d186a60870bfd3f11cdc82bb5f106713dff7944b8ceb42c014eb2069f12f09dd25820c55f36c29eddab2fc19907cb85987e2239d003cd5c1206c39e230b2d9bd8e75e3cd87a96c4b93e1091f46aa861c5efc6a4d894c56772df9c16afe980aae0e375cd096ed106374e6311dff265ecedc3909ffa4457fd7117547fadcc8e42361ecf8a70cb6c889cce7bbfe12ef00e6eea99ffaff"}}, 0x110) (async) modify_ldt$write2(0x11, &(0x7f0000000040)={0x9935c1bc, 0x20000800, 0x1000, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, 0x0) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000080)={0x1, 0x1ff}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r1, 0x2}}, 0x18) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f00000000c0)={0x0, 0xffffffff}) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x7fff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002780)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f0000000000)={0x90, 0xffffffffffffffda, r3, {0x6, 0x3, 0x3, 0x8, 0x7fffffff, 0x85, {0x3, 0x4, 0x100000000, 0x7, 0x100000001, 0x0, 0xfffffffa, 0x81, 0x5, 0x1000, 0x8, 0xffffffffffffffff, 0xee01, 0x2, 0x1}}}, 0x90) (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r5, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r5, &(0x7f00000047c0)={0xa0, 0x0, r6, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) (async) write$FUSE_WRITE(r4, &(0x7f0000000100)={0x18, 0x0, r6}, 0x18) 00:37:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r4, 0xc4, "60b7d5", "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"}}, 0x110) (async) modify_ldt$write2(0x11, &(0x7f0000000040)={0x9935c1bc, 0x20000800, 0x1000, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async, rerun: 64) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) (rerun: 64) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, 0x0) (async) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000080)={0x1, 0x1ff}) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r1, 0x2}}, 0x18) (async) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f00000000c0)={0x0, 0xffffffff}) 00:37:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x0, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x6a, 0x1, "11c911b914b8b9ad6b997577e5325c4017b2316ed3e8d278c3f45af4926093d7c9fd3f255b1ecdd607655acb61fc4af916889dbbf5e204473a3fdd477a69cd2b6f9815bbcb807342e606bdd6ba9e4dd0ba9003e69813cfb64543c249d623eeb877f9fd76698aee642cd431156f74afa71f84da2484c96588a80e607cc1a35d67446b146667799896f8e735aab6d3505fe09a902a2656b1526c550eaff3ef4e2958c608fd9aea8ef8c327907ff167b1f31d1d96213ccb0b2014b32076d0bd1ba29b9f812fab2a921a8dcdadb1b6091c2c8da64adb2e3acb755bc237c95e72bc2d094c0011b5ef177b1bfd21810a217d7d06cf8f18cd48fb95da15f4a597329d66", 0x4, 0x1, 0x7, 0x4, 0xe0, 0x7f, 0x3, 0x1}, r4}}, 0x120) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1000}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0xf}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r3, 0x2, "a97a3d", "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"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1000}}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0xf}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1000}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0xf}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async, rerun: 64) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r3, 0x2, "a97a3d", "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"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000440)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) ioctl$SW_SYNC_IOC_CREATE_FENCE(0xffffffffffffffff, 0xc0285700, &(0x7f00000001c0)={0x0, "e3baab2ded0ab3cc060a7220bdacb4af728feca330de1b34ebf22138895a6f11", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r5, 0xc0303e03, &(0x7f0000000280)={"89d7bba5109fd2477b77fca98bb00be3b67c9391563b0d4e5c3d39bf3873b16e", r6}) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, r1, 0x10, 0x0, @in6={0xa, 0x4e23, 0x6, @local, 0x3}}}, 0xa0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) ioctl$SNDCTL_DSP_STEREO(r5, 0xc0045003, &(0x7f00000002c0)=0x1) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000500)={0x14, 0x88, 0xfa00, {r9, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x7}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r4, 0xfffff75c}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, 0x0) (async) ioctl$VHOST_SET_VRING_NUM(r3, 0x4008af10, &(0x7f0000000080)={0x1, 0x1ff}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000000)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), r1, 0x2}}, 0x18) (async) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f00000000c0)={0x0, 0xffffffff}) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x0, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000440)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async) ioctl$SW_SYNC_IOC_CREATE_FENCE(0xffffffffffffffff, 0xc0285700, &(0x7f00000001c0)={0x0, "e3baab2ded0ab3cc060a7220bdacb4af728feca330de1b34ebf22138895a6f11", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r5, 0xc0303e03, &(0x7f0000000280)={"89d7bba5109fd2477b77fca98bb00be3b67c9391563b0d4e5c3d39bf3873b16e", r6}) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, r1, 0x10, 0x0, @in6={0xa, 0x4e23, 0x6, @local, 0x3}}}, 0xa0) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) ioctl$SNDCTL_DSP_STEREO(r5, 0xc0045003, &(0x7f00000002c0)=0x1) (async) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000500)={0x14, 0x88, 0xfa00, {r9, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x7}}}, 0x90) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r4, 0xfffff75c}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0xffffffffffffffff, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, r5}}, 0x30) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000400)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000003c0)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), r8, 0x2}}, 0x18) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r2}}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x2, 0xd}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x1f, r6, 0x0, 0x0, 0x1}}, 0x20) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r3, 0x2, "a97a3d", "2df948f36da9ae35ef2affe5b201e942f9544989139d103b5e64e6a1b34043c27374c9fb9493a8881b0cbc713499541ac3cbd3a5f8a032d4e4ab8b39f10cf46b6a61a8cd343ca4e6775f0e3a88f2be2a3b321d7009c68250ebc3aa3fb9bb6e1c0010439192acb151e491377a209fa30bcec9b5e3f686f1b5ae80b143d4986267c5fc55d12f84136988cd496c21cf3e04c62bf3c7926886344639515fa95a2d53ce59c4313f758321078fcb7ad7cd33f13cdbf6e770166f43ce1bdbbc431cea91b46fb10805567a8479cdbc6785876a3be26b0c7b355d0318e03ea1f0169bca55f231ea5a498519f02632a6fb2a41bf983e78691a6f84982590c743c2aecc43fb"}}, 0x110) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000440)={0x4, 0x8, 0xfa00, {r4, 0x2}}, 0x10) (async) ioctl$SW_SYNC_IOC_CREATE_FENCE(0xffffffffffffffff, 0xc0285700, &(0x7f00000001c0)={0x0, "e3baab2ded0ab3cc060a7220bdacb4af728feca330de1b34ebf22138895a6f11", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r5, 0xc0303e03, &(0x7f0000000280)={"89d7bba5109fd2477b77fca98bb00be3b67c9391563b0d4e5c3d39bf3873b16e", r6}) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f00000000c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, r1, 0x10, 0x0, @in6={0xa, 0x4e23, 0x6, @local, 0x3}}}, 0xa0) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) ioctl$SNDCTL_DSP_STEREO(r5, 0xc0045003, &(0x7f00000002c0)=0x1) (async) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000500)={0x14, 0x88, 0xfa00, {r9, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x7}}}, 0x90) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r4, 0xfffff75c}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r2}}, 0xc) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) (async) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x2, 0xd}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x128) (async) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x1f, r6, 0x0, 0x0, 0x1}}, 0x20) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000003c0), r1, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x0, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0xffffffffffffffff, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, r5}}, 0x30) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000400)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000003c0)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), r8, 0x2}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0xffffffffffffffff, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, r5}}, 0x30) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000400)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000003c0)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) (async) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), r8, 0x2}}, 0x18) (async) 00:37:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000003c0), r1, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000080)={0xa, 0x4, 0xfa00, {r2}}, 0xc) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) (async) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100), 0x2, 0xd}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x128) (async) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000180)=0x1f, r6, 0x0, 0x0, 0x1}}, 0x20) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r3, 0x9b01}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000003c0), r1, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 00:37:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x9}}, 0xffffffffffffffa4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020}, 0x2020) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000002500)={{0xffffffffffffffff, 0x3, 0x4, 0x2, 0x3}, 0x7fffffff, 0x2, 'id1\x00', 'timer1\x00', 0x0, 0xff, 0x2, 0x2, 0x6}) read$FUSE(r4, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x1, r6, 0x1c, 0x1, @in={0x2, 0x4e20, @loopback}}}, 0xa0) syz_open_dev$loop(&(0x7f0000000480), 0x1, 0x80) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000047c0)={0xa0, 0x0, r7, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_LK(r4, &(0x7f0000002600)={0x28, 0x0, r7, {{0x7, 0x4, 0x0, r5}}}, 0x28) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x40000000002, {0xa, 0x4e21, 0x403, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0xffff}, r1}}, 0x38) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r1, 0x8}}, 0x18) 00:37:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 00:37:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r3, 0x9b01}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0xffffffffffffffff, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, r5}}, 0x30) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r6, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000400)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000003c0)=0x1, 0xffffffffffffffff, 0x0, 0x1, 0x4}}, 0x20) (async) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) (async) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000380)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), r8, 0x2}}, 0x18) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) 00:37:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111, 0xa}}, 0x20) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) (rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 00:37:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x9}}, 0xffffffffffffffa4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020}, 0x2020) (async) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000002500)={{0xffffffffffffffff, 0x3, 0x4, 0x2, 0x3}, 0x7fffffff, 0x2, 'id1\x00', 'timer1\x00', 0x0, 0xff, 0x2, 0x2, 0x6}) (async) read$FUSE(r4, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x1, r6, 0x1c, 0x1, @in={0x2, 0x4e20, @loopback}}}, 0xa0) (async) syz_open_dev$loop(&(0x7f0000000480), 0x1, 0x80) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000047c0)={0xa0, 0x0, r7, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_LK(r4, &(0x7f0000002600)={0x28, 0x0, r7, {{0x7, 0x4, 0x0, r5}}}, 0x28) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x40000000002, {0xa, 0x4e21, 0x403, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0xffff}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r1, 0x8}}, 0x18) 00:37:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x111, 0xa}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000000)={0x4, 0x8, 0xfa00, {r3, 0x9b01}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev, 0x3}, r2}}, 0x7f) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r8, 0x7, "a40a85", "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"}}, 0x110) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {r5, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e21, @local}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {r10, 0x96}}, 0x10) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x9}}, 0xffffffffffffffa4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020}, 0x2020) (async) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000002500)={{0xffffffffffffffff, 0x3, 0x4, 0x2, 0x3}, 0x7fffffff, 0x2, 'id1\x00', 'timer1\x00', 0x0, 0xff, 0x2, 0x2, 0x6}) (async) read$FUSE(r4, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r3, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x1, r6, 0x1c, 0x1, @in={0x2, 0x4e20, @loopback}}}, 0xa0) syz_open_dev$loop(&(0x7f0000000480), 0x1, 0x80) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000047c0)={0xa0, 0x0, r7, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) (async) write$FUSE_LK(r4, &(0x7f0000002600)={0x28, 0x0, r7, {{0x7, 0x4, 0x0, r5}}}, 0x28) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x40000000002, {0xa, 0x4e21, 0x403, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0xffff}, r1}}, 0x38) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), r1, 0x8}}, 0x18) 00:37:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xffe8, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x2, {0xfffffffa, 0x401, "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", 0x9, 0x81, 0x24, 0x0, 0x9, 0x1f, 0x3f}, r2}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev, 0xc937}, r1}}, 0x48) 00:37:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async, rerun: 32) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev, 0x3}, r2}}, 0x7f) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r8, 0x7, "a40a85", "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"}}, 0x110) (async) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {r5, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e21, @local}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {r10, 0x96}}, 0x10) 00:37:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xffe8, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x2, {0xfffffffa, 0x401, "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", 0x9, 0x81, 0x24, 0x0, 0x9, 0x1f, 0x3f}, r2}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xffe8, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x2, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x2, {0xfffffffa, 0x401, "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", 0x9, 0x81, 0x24, 0x0, 0x9, 0x1f, 0x3f}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) 00:37:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev, 0xc937}, r1}}, 0x48) 00:37:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev, 0xc937}, r1}}, 0x48) 00:37:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xffe8, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x2, {0xfffffffa, 0x401, "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", 0x9, 0x81, 0x24, 0x0, 0x9, 0x1f, 0x3f}, r2}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0xffe8, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x2, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x2, {0xfffffffa, 0x401, "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", 0x9, 0x81, 0x24, 0x0, 0x9, 0x1f, 0x3f}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) 00:37:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x10}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev, 0x3}, r2}}, 0x7f) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r8}}, 0x128) (async) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r8, 0x7, "a40a85", "33f7020764703f387280f9e50043bc8f7f3af13463890f4b53704974073977f50464062c35f9dad879599a913cfa105d80e11d19db02e60d9aa0a20e91c8b5a6db4ce9f8d6cfbecfacc58095fd1f4a6998d7bb1338b6f485ce4d46b290c69905a016900b7b3f739081c1d36fdaff816b68ab9fcf537eff0899a2131c0dca75519c73cc7f922d1e7298070cea2d99e63e548e11a5c514c1390d44d0ccaf4be43b460eb2aa330ad8a452b985fca1570d7499a51ab5e329c1e00a5d7348b9f24ea818c66a65c584883c39d5fe31168a5bae62060c026df4f5cfbd9a5433a28c2993e588afa1797b5e179a434884b0a89eed97cf839ea5b5675a15dc636037c42813"}}, 0x110) (async) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f00000003c0)={0x15, 0x110, 0xfa00, {r5, 0x2, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e21, @local}}}, 0x118) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {r10, 0x96}}, 0x10) 00:37:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000080)={{0xffffffffffffffff, 0x2, 0x5, 0x2}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @empty}, {0xa, 0x3, 0x0, @dev={0xfe, 0x80, '\x00', 0x37}, 0x56d}, r1}}, 0x48) 00:37:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x10}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x10}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) 00:37:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000080)={{0xffffffffffffffff, 0x2, 0x5, 0x2}}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @empty}, {0xa, 0x3, 0x0, @dev={0xfe, 0x80, '\x00', 0x37}, 0x56d}, r1}}, 0x48) 00:37:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @private1, 0x2}, r1, 0x1}}, 0x48) 00:37:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x10}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000080)={{0xffffffffffffffff, 0x2, 0x5, 0x2}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @empty}, {0xa, 0x3, 0x0, @dev={0xfe, 0x80, '\x00', 0x37}, 0x56d}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000080)={{0xffffffffffffffff, 0x2, 0x5, 0x2}}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @empty}, {0xa, 0x3, 0x0, @dev={0xfe, 0x80, '\x00', 0x37}, 0x56d}, r1}}, 0x48) (async) 00:37:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) 00:37:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r3, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x80000001}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x101}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0xffffffffffffff27, 0x31, 0x7}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1ff}]}, 0x68}, 0x1, 0x0, 0x0, 0x5051}, 0x20000080) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r7, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x6, @mcast1, 0x1ff}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @private1}, r1, 0x1}}, 0x48) 00:37:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) 00:37:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0xcbe5, @mcast2}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @private1}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280), r4) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="9eedcc3c47ceafe280f586fe88d7b001d38c9e000000000000000b0000"], 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000680)=ANY=[@ANYBLOB="2c000000925b6e6e8d3e78748aec0239332a80f0e19f295b86c2", @ANYRES16=r8, @ANYBLOB="000828bd7000fbdbdf250100000008002c000400000008003900fe0300000500330001000000"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x880) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r1, 0x4, "2d2acc", "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"}}, 0x110) 00:37:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) 00:37:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @private1}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) (async) 00:37:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @private1}, 0xffffffffffffffff, 0x1}}, 0x48) 00:37:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r3, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x80000001}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x101}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0xffffffffffffff27, 0x31, 0x7}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1ff}]}, 0x68}, 0x1, 0x0, 0x0, 0x5051}, 0x20000080) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r7, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x6, @mcast1, 0x1ff}}}, 0x90) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r3, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x80000001}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x101}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0xffffffffffffff27, 0x31, 0x7}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1ff}]}, 0x68}, 0x1, 0x0, 0x0, 0x5051}, 0x20000080) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r7, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x6, @mcast1, 0x1ff}}}, 0x90) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0xcbe5, @mcast2}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0xcbe5, @mcast2}}}, 0x90) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) 00:37:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280), r4) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r5, 0x2}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="9eedcc3c47ceafe280f586fe88d7b001d38c9e000000000000000b0000"], 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000680)=ANY=[@ANYBLOB="2c000000925b6e6e8d3e78748aec0239332a80f0e19f295b86c2", @ANYRES16=r8, @ANYBLOB="000828bd7000fbdbdf250100000008002c000400000008003900fe0300000500330001000000"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x880) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r1, 0x4, "2d2acc", "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"}}, 0x110) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000280), r4) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) (async) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r5, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="9eedcc3c47ceafe280f586fe88d7b001d38c9e000000000000000b0000"], 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000680)=ANY=[@ANYBLOB="2c000000925b6e6e8d3e78748aec0239332a80f0e19f295b86c2", @ANYRES16=r8, @ANYBLOB="000828bd7000fbdbdf250100000008002c000400000008003900fe0300000500330001000000"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x880) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r1, 0x4, "2d2acc", "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"}}, 0x110) (async) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @private1}, r1}}, 0x48) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @private1}, r1, 0x1}}, 0x48) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x42}}, {0xa, 0x0, 0x602, @dev={0xfe, 0x80, '\x00', 0x1b}}, r4, 0x8000}}, 0x48) 00:37:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e24, 0xcbe5, @mcast2}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) (async) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r3, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x80000001}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x101}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0xffffffffffffff27, 0x31, 0x7}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1ff}]}, 0x68}, 0x1, 0x0, 0x0, 0x5051}, 0x20000080) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r7, 0x1c, 0x0, @in6={0xa, 0x4e20, 0x6, @mcast1, 0x1ff}}}, 0x90) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000280), r4) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r6, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x7, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r5}}, 0x128) (async) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000240)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r5, 0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) (async) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="9eedcc3c47ceafe280f586fe88d7b001d38c9e000000000000000b0000"], 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000640)={&(0x7f0000000680)=ANY=[@ANYBLOB="2c000000925b6e6e8d3e78748aec0239332a80f0e19f295b86c2", @ANYRES16=r8, @ANYBLOB="000828bd7000fbdbdf250100000008002c000400000008003900fe0300000500330001000000"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x880) (async) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r1, 0x4, "2d2acc", "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"}}, 0x110) 00:37:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x128) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r6, 0xfffffbff}}, 0x48) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r2, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x42}}, {0xa, 0x0, 0x602, @dev={0xfe, 0x80, '\x00', 0x1b}}, r4, 0x8000}}, 0x48) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000080)={{0xffffffffffffffff, 0x2, 0x5, 0x2}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @empty}, {0xa, 0x3, 0x0, @dev={0xfe, 0x80, '\x00', 0x37}, 0x56d}, r1}}, 0x48) 00:37:47 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000200)={0x50, 0x0, r0, {0x7, 0x24, 0x0, 0x10000, 0x6984, 0x4ad, 0x80000000, 0x1}}, 0x50) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x26b, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7fff, @private1, 0x2}, {0xa, 0x4e22, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x5}, r2, 0x8001}}, 0x48) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r3) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000001c0)) tkill(r1, 0x24) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000002c0)={0x2}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000002380), r7, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 00:37:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000000) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty, 0x10}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x42}}, {0xa, 0x0, 0x602, @dev={0xfe, 0x80, '\x00', 0x1b}}, r4, 0x8000}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2}}, 0x128) (async) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r2, 0x0, 0x1, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x42}}, {0xa, 0x0, 0x602, @dev={0xfe, 0x80, '\x00', 0x1b}}, r4, 0x8000}}, 0x48) (async) 00:37:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000000) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) 00:37:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) 00:37:47 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000200)={0x50, 0x0, r0, {0x7, 0x24, 0x0, 0x10000, 0x6984, 0x4ad, 0x80000000, 0x1}}, 0x50) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x26b, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, r4}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7fff, @private1, 0x2}, {0xa, 0x4e22, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x5}, r2, 0x8001}}, 0x48) (async) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r3) (async) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000001c0)) (async) tkill(r1, 0x24) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000002c0)={0x2}) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000002380), r7, 0x1}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 00:37:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x128) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r6, 0xfffffbff}}, 0x48) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty, 0x2}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000), r1}}, 0x20) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) (async) 00:37:47 executing program 4: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000100)={0x0, 0x20}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, r1, {0x0, 0x4}}, 0x20) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x57}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r4, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000000140)={0x60, 0x0, r5, {{0x0, 0xffffffffffffff01, 0x6, 0x0, 0x8, 0x4, 0x9, 0x5}}}, 0x60) read$FUSE(r0, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, r6, {0x2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 00:37:47 executing program 5: read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000200)={0x50, 0x0, r0, {0x7, 0x24, 0x0, 0x10000, 0x6984, 0x4ad, 0x80000000, 0x1}}, 0x50) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x26b, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0, r4}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7fff, @private1, 0x2}, {0xa, 0x4e22, 0x7fff, @private1={0xfc, 0x1, '\x00', 0x1}, 0x5}, r2, 0x8001}}, 0x48) (async) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r3) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f00000001c0)) (async) tkill(r1, 0x24) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000002c0)={0x2}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) (async) write$RDMA_USER_CM_CMD_QUERY(r5, &(0x7f0000000280)={0x13, 0x10, 0xfa00, {&(0x7f0000002380), r7, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 00:37:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty, 0x2}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000), r1}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty, 0x2}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000), r1}}, 0x20) (async) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x7fff}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002780)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r2, &(0x7f0000000000)={0x90, 0xffffffffffffffda, r3, {0x6, 0x3, 0x3, 0x8, 0x7fffffff, 0x85, {0x3, 0x4, 0x100000000, 0x7, 0x100000001, 0x0, 0xfffffffa, 0x81, 0x5, 0x1000, 0x8, 0xffffffffffffffff, 0xee01, 0x2, 0x1}}}, 0x90) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r5, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r5, &(0x7f00000047c0)={0xa0, 0x0, r6, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_WRITE(r4, &(0x7f0000000100)={0x18, 0x0, r6}, 0x18) 00:37:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x10001}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @ib={0x1b, 0xfff9, 0x7, {"5128905e599fbea847f67a6053c07315"}, 0x1d, 0x2}}}, 0x90) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @multicast1}, 0xfffffffa}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty, 0x2}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000), r1}}, 0x20) 00:37:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x128) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r6, 0xfffffbff}}, 0x48) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x10001}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @ib={0x1b, 0xfff9, 0x7, {"5128905e599fbea847f67a6053c07315"}, 0x1d, 0x2}}}, 0x90) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @multicast1}, 0xfffffffa}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @multicast1}, 0xfffffffa}}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x40}, {0xa, 0x4e23, 0x10001, @private1={0xfc, 0x1, '\x00', 0x1}, 0x2}, r1, 0x1}}, 0x48) 00:37:48 executing program 4: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000100)={0x0, 0x20}) (async) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, r1, {0x0, 0x4}}, 0x20) (async) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x57}}, 0x18) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r4, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000000140)={0x60, 0x0, r5, {{0x0, 0xffffffffffffff01, 0x6, 0x0, 0x8, 0x4, 0x9, 0x5}}}, 0x60) (async) read$FUSE(r0, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, r6, {0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x2}}, 0x10) 00:37:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0xca, "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", 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, r3}}, 0xfffffffffffffd47) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0xffffff00, 0x0, "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", 0x4, 0x9, 0x6, 0xb0, 0x6, 0x1, 0x54}, r3}}, 0x128) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @ib={0x1b, 0x1000, 0x2, {"97d9c896636cce55e8b263f7e9ccf4c5"}, 0x10000, 0x7, 0xdd}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r6}}, 0x18) 00:37:48 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x10001}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @ib={0x1b, 0xfff9, 0x7, {"5128905e599fbea847f67a6053c07315"}, 0x1d, 0x2}}}, 0x90) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x40000c0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), r3) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0xa00800}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, r6, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x2}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xfa}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4040800}, 0xd4) sendmsg$BATADV_CMD_GET_HARDIF(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004000}, 0x20008002) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r8, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r9, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r7, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r9, 0x100, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0xc004) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x2004c080) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @multicast1}, 0xfffffffa}}}, 0x30) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @multicast1}, 0xfffffffa}}}, 0x30) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async) 00:37:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r6}}, 0x128) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r6, 0xfffffbff}}, 0x48) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2, 0x4}}, 0x10) 00:37:48 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2, 0x4}}, 0x10) 00:37:48 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) (async) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0xca, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, r3}}, 0xfffffffffffffd47) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0xffffff00, 0x0, "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", 0x4, 0x9, 0x6, 0xb0, 0x6, 0x1, 0x54}, r3}}, 0x128) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @ib={0x1b, 0x1000, 0x2, {"97d9c896636cce55e8b263f7e9ccf4c5"}, 0x10000, 0x7, 0xdd}}}, 0x90) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r6}}, 0x18) 00:37:49 executing program 4: ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f0000000100)={0x0, 0x20}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0x0, r1, {0x0, 0x4}}, 0x20) (async) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x57}}, 0x18) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r4, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000000140)={0x60, 0x0, r5, {{0x0, 0xffffffffffffff01, 0x6, 0x0, 0x8, 0x4, 0x9, 0x5}}}, 0x60) (async) read$FUSE(r0, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_POLL(r4, &(0x7f00000000c0)={0x18, 0x0, r6, {0x2}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) (async, rerun: 32) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r3, 0x2}}, 0x10) (rerun: 32) 00:37:49 executing program 1: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) (async) 00:37:49 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r2, 0x4}}, 0x10) 00:37:49 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0xca, "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", 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, r3}}, 0xfffffffffffffd47) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0xffffff00, 0x0, "ef23d3e71cae32cee189f68a760d964ab5c158e13cac870e6f76f92cd3abb5025d9fdd334c761b549db3c09d1a97f79f3b2e1ae9239aeddb7d954d3eb2e7aca3d2e1d8d581f7afb5166a05592e62f2578545b07daef35044c772e318e42b22a88d37e1464cd5d8eaeab4ce4157f03b92fabe9af2a9f1ad288b655add9574a5b907e33ae20f80c3172adb52c8653ba198061b43e34bc49ee9a53d130477169dd099a404f6d7e25d0043d3e2c409c0447eb703d9d1d7ad663fc7fe1025294b3ce44be859bb5b97e8d8ee8f9fab2d6eb5c679dcce60ce6a16c5f4604e1e4b7523a4c0e7c29029bebcf055fadcb842df32b7dc2861ce7b11eb6cf299eff56435d75d", 0x4, 0x9, 0x6, 0xb0, 0x6, 0x1, 0x54}, r3}}, 0x128) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @ib={0x1b, 0x1000, 0x2, {"97d9c896636cce55e8b263f7e9ccf4c5"}, 0x10000, 0x7, 0xdd}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r6}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0xca, "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", 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, r3}}, 0xfffffffffffffd47) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0xffffff00, 0x0, "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", 0x4, 0x9, 0x6, 0xb0, 0x6, 0x1, 0x54}, r3}}, 0x128) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @ib={0x1b, 0x1000, 0x2, {"97d9c896636cce55e8b263f7e9ccf4c5"}, 0x10000, 0x7, 0xdd}}}, 0x90) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r1}}, 0x48) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1, r6}}, 0x18) (async) 00:37:49 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x800, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1ff}, @ib={0x1b, 0x9, 0x7fffffff, {"ee8cc484aea2f0dc53e58fe67316cf37"}, 0x2, 0x0, 0x8}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xffffffec, @empty}, r1}}, 0x30) 00:37:49 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x800, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1ff}, @ib={0x1b, 0x9, 0x7fffffff, {"ee8cc484aea2f0dc53e58fe67316cf37"}, 0x2, 0x0, 0x8}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:49 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xffffffec, @empty}, r1}}, 0x30) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x9}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0), 0x13f, 0x4}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xffffffec, @empty}, r1}}, 0x30) (async) 00:37:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r2}}, 0x48) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r3, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x1412, 0x100, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x8050}, 0x20000801) 00:37:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x800, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1ff}, @ib={0x1b, 0x9, 0x7fffffff, {"ee8cc484aea2f0dc53e58fe67316cf37"}, 0x2, 0x0, 0x8}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x5, @empty}, {0xa, 0x0, 0x4, @dev}, r1, 0x5}}, 0x48) 00:37:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, 0x0, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x800, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1ff}, @ib={0x1b, 0x9, 0x7fffffff, {"ee8cc484aea2f0dc53e58fe67316cf37"}, 0x2, 0x0, 0x8}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x9}}, 0x20) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0xffffffec, @empty}, r1}}, 0x30) 00:37:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r3, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x1412, 0x100, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x8050}, 0x20000801) 00:37:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x800, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1ff}, @ib={0x1b, 0x9, 0x7fffffff, {"ee8cc484aea2f0dc53e58fe67316cf37"}, 0x2, 0x0, 0x8}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xadc}, r3}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r5}}, 0x30) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r6, 0x4008af23, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r6, 0x80605414, &(0x7f00000000c0)) 00:37:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x5, @empty}, {0xa, 0x0, 0x4, @dev}, r1, 0x5}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x2, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x5, @empty}, {0xa, 0x0, 0x4, @dev}, r1, 0x5}}, 0x48) (async) 00:37:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, r2}}, 0x48) (async) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r3, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x1412, 0x100, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x8050}, 0x20000801) 00:37:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e22, 0x6, @local, 0x10001}, r3}}, 0x38) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x4, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @private=0xa010100}, @in6={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}}}, 0x118) 00:37:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x800, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x40, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1ff}, @ib={0x1b, 0x9, 0x7fffffff, {"ee8cc484aea2f0dc53e58fe67316cf37"}, 0x2, 0x0, 0x8}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 00:37:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x40}, r1}}, 0x48) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x12}}, 0x10) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r7, r3}}, 0x18) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r11, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r7}}, 0x18) 00:37:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x5, @empty}, {0xa, 0x0, 0x4, @dev}, r1, 0x5}}, 0x48) 00:37:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xadc}, r3}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r5}}, 0x30) (async) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r6, 0x4008af23, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r6, 0x80605414, &(0x7f00000000c0)) 00:37:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xadc}, r3}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r5}}, 0x30) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r6, 0x4008af23, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r6, 0x80605414, &(0x7f00000000c0)) 00:37:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r3, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r3, &(0x7f00000047c0)={0xa0, 0x0, r4, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, r4}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async, rerun: 32) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0x10) (async, rerun: 32) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) (async, rerun: 32) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e22, 0x6, @local, 0x10001}, r3}}, 0x38) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000180)={0x15, 0x110, 0xfa00, {r3, 0x4, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @private=0xa010100}, @in6={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}}}, 0x118) (rerun: 64) 00:37:50 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x40}, r1}}, 0x48) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x12}}, 0x10) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r7, r3}}, 0x18) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r11, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x128) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r7}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x40}, r1}}, 0x48) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r5, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r4, 0x12}}, 0x10) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r7, r3}}, 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r11, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r10}}, 0x128) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000080)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r7}}, 0x18) (async) 00:37:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xadc}, r3}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r5}}, 0x30) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r6, 0x4008af23, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r6, 0x80605414, &(0x7f00000000c0)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0), 0x106}}, 0x20) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r3}}, 0x128) (async) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xadc}, r3}}, 0x30) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r5}}, 0x30) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r6, 0x4008af23, 0x0) (async) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r6, 0x80605414, &(0x7f00000000c0)) (async) 00:37:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r3, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r3, &(0x7f00000047c0)={0xa0, 0x0, r4, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, r4}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 00:37:50 executing program 0: write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r3, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r3, &(0x7f00000047c0)={0xa0, 0x0, r4, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, r4}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) read$FUSE(r3, &(0x7f0000002780)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(r3, &(0x7f00000047c0)={0xa0, 0x0, r4, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) (async) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, r4}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) (async) 00:37:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1, 0x8000000}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) 00:37:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000007c0)={0xffffffffffffffff}, 0x106}}, 0x20) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r8, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r7}}, 0x128) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r9, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "0e0cb16b1a71c51a0bc130d601119de79d23e7a200845be781b8370b31c803881179fa07d966310996967dd2cd086698263966f4a5fd3487e29e7593220392046d18e68e91d03e60bd03c82e792de42ce7be168beff2dc3199ea5f47f1139985e121584bf0e7a247c660e00be584961655152c9b2c74e2ade442b3bb9416b05f7fa1a4b0b4777d31dd0346d4cc8d585833c1bce8277330867d7d3880970a49824c05b2eac68973e0e173cae106b78d1dbf2ada4a8f53f0267948e836eb6fcc631f36efc1917326da33a562d12784611b28b9cae2d95c8eda07a36fc2ba203c6488080b333ebc3d62760ac733da2bd28275e332518dad1f3c02cf9e6717311609", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x664}, {0xa, 0x4e21, 0x7, @empty, 0x2}, 0xffffffffffffffff, 0x3ff}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3f, @private2, 0x80}, {0xa, 0x4e23, 0x81, @local, 0xffff8000}, r7, 0xfffffbff}}, 0x48) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002f80), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000002fc0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r4}}, 0x128) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r4, 0x462f34ec32aee10c}}, 0x10) 00:37:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3d}}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x50}}, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 00:37:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r1, 0x8000000}}, 0x48) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000002b40)={0x5, 0x10, 0xfa00, {0x0}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r1, 0x6}}, 0x10) 00:37:50 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002780)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000047c0)={0xa0, 0x0, r1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}}, 0xa0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x0, r1, {0x1}}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x110, 0xfa00, {r3, 0xffffff44, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0xffff0001, @mcast1, 0x8}, @ib={0x1b, 0xee23, 0x8001, {"ee44cf4bb95327092500"}, 0x6, 0x1, 0x401}}}, 0x118) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r3, 0x42b}}, 0x10) 00:37:50 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) (async) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3d}}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x50}}, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) [ 990.361487] ================================================================== [ 990.369198] BUG: KASAN: use-after-free in __list_del_entry_valid+0xd6/0xf0 [ 990.376207] Read of size 8 at addr ffff8880a9f27d20 by task syz-executor.5/21115 [ 990.383899] [ 990.385513] CPU: 0 PID: 21115 Comm: syz-executor.5 Not tainted 4.14.286-syzkaller #0 [ 990.393567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 990.402928] Call Trace: [ 990.405509] dump_stack+0x1b2/0x281 [ 990.410348] print_address_description.cold+0x54/0x1d3 [ 990.415610] kasan_report_error.cold+0x8a/0x191 [ 990.420269] ? __list_del_entry_valid+0xd6/0xf0 [ 990.424920] __asan_report_load8_noabort+0x68/0x70 [ 990.429855] ? lock_acquire+0xc0/0x3f0 [ 990.433723] ? __list_del_entry_valid+0xd6/0xf0 [ 990.438408] __list_del_entry_valid+0xd6/0xf0 [ 990.443068] cma_cancel_operation+0x285/0x950 [ 990.447561] rdma_destroy_id+0x84/0xb60 [ 990.451544] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 990.456639] ucma_close+0x11a/0x340 [ 990.460252] ? ima_file_free+0x4f/0x330 [ 990.464209] ? ucma_query_addr+0x320/0x320 [ 990.468467] __fput+0x25f/0x7a0 [ 990.471803] task_work_run+0x11f/0x190 [ 990.475763] exit_to_usermode_loop+0x1ad/0x200 [ 990.480457] do_syscall_64+0x4a3/0x640 [ 990.484335] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 990.489508] RIP: 0033:0x7efed2030d4b [ 990.493297] RSP: 002b:00007ffd83223780 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 990.501056] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007efed2030d4b [ 990.508583] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 990.515875] RBP: 00007efed2192960 R08: 0000000000000000 R09: 00007efed2195b30 [ 990.523138] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000000f1e24 [ 990.530391] R13: 00007ffd83223880 R14: 00007efed2191100 R15: 0000000000000032 [ 990.537905] [ 990.539527] Allocated by task 21227: [ 990.543245] kasan_kmalloc+0xeb/0x160 [ 990.547042] kmem_cache_alloc_trace+0x131/0x3d0 [ 990.552226] rdma_create_id+0x57/0x4c0 [ 990.556158] ucma_create_id+0x18b/0x500 [ 990.560206] ucma_write+0x206/0x2c0 [ 990.564966] __vfs_write+0xe4/0x630 [ 990.568583] vfs_write+0x17f/0x4d0 [ 990.572144] SyS_write+0xf2/0x210 [ 990.575585] do_syscall_64+0x1d5/0x640 [ 990.579474] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 990.584651] [ 990.586416] Freed by task 21223: [ 990.590145] kasan_slab_free+0xc3/0x1a0 [ 990.594118] kfree+0xc9/0x250 [ 990.597338] ucma_close+0x11a/0x340 [ 990.600985] __fput+0x25f/0x7a0 [ 990.604377] task_work_run+0x11f/0x190 [ 990.608563] exit_to_usermode_loop+0x1ad/0x200 [ 990.613146] do_syscall_64+0x4a3/0x640 [ 990.617075] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 990.622367] [ 990.623980] The buggy address belongs to the object at ffff8880a9f27b40 [ 990.623980] which belongs to the cache kmalloc-1024 of size 1024 [ 990.636827] The buggy address is located 480 bytes inside of [ 990.636827] 1024-byte region [ffff8880a9f27b40, ffff8880a9f27f40) [ 990.648776] The buggy address belongs to the page: [ 990.653688] page:ffffea0002a7c980 count:1 mapcount:0 mapping:ffff8880a9f26040 index:0x0 compound_mapcount: 0 [ 990.663647] flags: 0xfff00000008100(slab|head) [ 990.668221] raw: 00fff00000008100 ffff8880a9f26040 0000000000000000 0000000100000007 [ 990.676443] raw: ffffea0002ae7da0 ffffea0002b986a0 ffff88813fe74ac0 0000000000000000 [ 990.684318] page dumped because: kasan: bad access detected [ 990.691717] [ 990.693331] Memory state around the buggy address: [ 990.698303] ffff8880a9f27c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 990.705746] ffff8880a9f27c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 990.713098] >ffff8880a9f27d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 990.720498] ^ [ 990.724886] ffff8880a9f27d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 990.732224] ffff8880a9f27e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 990.739564] ================================================================== [ 990.746974] Disabling lock debugging due to kernel taint [ 990.758119] Kernel panic - not syncing: panic_on_warn set ... [ 990.758119] [ 990.765496] CPU: 0 PID: 21115 Comm: syz-executor.5 Tainted: G B 4.14.286-syzkaller #0 [ 990.774674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 990.784328] Call Trace: [ 990.786909] dump_stack+0x1b2/0x281 [ 990.791048] panic+0x1f9/0x42d [ 990.794224] ? add_taint.cold+0x16/0x16 [ 990.798307] ? ___preempt_schedule+0x16/0x18 [ 990.802715] kasan_end_report+0x43/0x49 [ 990.806688] kasan_report_error.cold+0xa7/0x191 [ 990.811368] ? __list_del_entry_valid+0xd6/0xf0 [ 990.816036] __asan_report_load8_noabort+0x68/0x70 [ 990.821128] ? lock_acquire+0xc0/0x3f0 [ 990.825052] ? __list_del_entry_valid+0xd6/0xf0 [ 990.829926] __list_del_entry_valid+0xd6/0xf0 [ 990.834497] cma_cancel_operation+0x285/0x950 [ 990.839038] rdma_destroy_id+0x84/0xb60 [ 990.843179] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 990.848764] ucma_close+0x11a/0x340 [ 990.852848] ? ima_file_free+0x4f/0x330 [ 990.857686] ? ucma_query_addr+0x320/0x320 [ 990.862011] __fput+0x25f/0x7a0 [ 990.865863] task_work_run+0x11f/0x190 [ 990.870580] exit_to_usermode_loop+0x1ad/0x200 [ 990.875241] do_syscall_64+0x4a3/0x640 [ 990.879467] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 990.884660] RIP: 0033:0x7efed2030d4b [ 990.888356] RSP: 002b:00007ffd83223780 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 990.896240] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007efed2030d4b [ 990.903865] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000003 [ 990.911135] RBP: 00007efed2192960 R08: 0000000000000000 R09: 00007efed2195b30 [ 990.918528] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000000f1e24 [ 990.925995] R13: 00007ffd83223880 R14: 00007efed2191100 R15: 0000000000000032 [ 990.933581] Kernel Offset: disabled [ 990.937199] Rebooting in 86400 seconds..