DAEMON(r0, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)={0x40, r1, 0x800, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp=r2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e23}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @loopback}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) syslog(0x4, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) pipe2$watch_queue(&(0x7f00000000c0), 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 1: syslog(0x4, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:44 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 07:25:44 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) syslog(0x4, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:44 executing program 1: syslog(0x0, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) pipe2$watch_queue(&(0x7f00000000c0), 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r1}, 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) 07:25:44 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) syslog(0x4, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 1: syslog(0x0, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xd, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) pipe2$watch_queue(&(0x7f00000000c0), 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) syslog(0x4, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r1}, 0x8) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "050239d183f1b399fd825299cc804181766d71fd162489285b9d2928693b0247fa3b8ffa1ea9fd6cd49db9f1296f2611863c453ae62f6153711777a45bffaaf3b521269a4b681356eb00f05f4c6fee1105a951b6fe5c478984f75b26702e13b28683f00218306f8ed7c72172bf6ca8a00d67d159356110ef3a636ce917653dae7056aebf484e71b5857d7760db79d580519d4f64ee81454c9d04ff56a60eb6e56b27957ec66e6cf5ad4f8baa4911bb4a154fec813bd509191ea9d89803814f8edcbdaaef7e227b3b70f9a8fedb890e2994bb3801b4a20b303cc35e4460077fc6744cd539a499864e91b62d9a27cbece30b4f37daf7201a15ed73b042de313301", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xd, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 1: syslog(0x0, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) pipe2$watch_queue(&(0x7f00000000c0), 0x80) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xd, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) pipe2$watch_queue(&(0x7f00000000c0), 0x80) 07:25:44 executing program 0: socket$l2tp(0x2, 0x2, 0x73) syslog(0x4, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 1: syslog(0x4, 0x0, 0x0) 07:25:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xd, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) pipe2$watch_queue(&(0x7f00000000c0), 0x80) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xd, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 1: syslog(0x4, 0x0, 0x0) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) pipe2$watch_queue(&(0x7f00000000c0), 0x80) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "050239d183f1b399fd825299cc804181766d71fd162489285b9d2928693b0247fa3b8ffa1ea9fd6cd49db9f1296f2611863c453ae62f6153711777a45bffaaf3b521269a4b681356eb00f05f4c6fee1105a951b6fe5c478984f75b26702e13b28683f00218306f8ed7c72172bf6ca8a00d67d159356110ef3a636ce917653dae7056aebf484e71b5857d7760db79d580519d4f64ee81454c9d04ff56a60eb6e56b27957ec66e6cf5ad4f8baa4911bb4a154fec813bd509191ea9d89803814f8edcbdaaef7e227b3b70f9a8fedb890e2994bb3801b4a20b303cc35e4460077fc6744cd539a499864e91b62d9a27cbece30b4f37daf7201a15ed73b042de313301", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xd, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 0: syslog(0x4, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 0: syslog(0x0, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000200)={0xd, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 1: syslog(0x4, 0x0, 0x0) 07:25:44 executing program 5: write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 1: syslog(0x4, 0x0, 0x0) 07:25:44 executing program 0: syslog(0x0, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x106, 0x5}}, 0x20) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 5: write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 1: syslog(0x4, 0x0, 0x0) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 0: syslog(0x0, &(0x7f0000000000)=""/69, 0x45) 07:25:44 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r0, 0x2}}, 0x18) 07:25:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) 07:25:44 executing program 5: write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 1: syslog(0x4, 0x0, 0x0) 07:25:44 executing program 0: syslog(0x4, 0x0, 0x0) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r0, 0x2}}, 0x18) 07:25:44 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "050239d183f1b399fd825299cc804181766d71fd162489285b9d2928693b0247fa3b8ffa1ea9fd6cd49db9f1296f2611863c453ae62f6153711777a45bffaaf3b521269a4b681356eb00f05f4c6fee1105a951b6fe5c478984f75b26702e13b28683f00218306f8ed7c72172bf6ca8a00d67d159356110ef3a636ce917653dae7056aebf484e71b5857d7760db79d580519d4f64ee81454c9d04ff56a60eb6e56b27957ec66e6cf5ad4f8baa4911bb4a154fec813bd509191ea9d89803814f8edcbdaaef7e227b3b70f9a8fedb890e2994bb3801b4a20b303cc35e4460077fc6744cd539a499864e91b62d9a27cbece30b4f37daf7201a15ed73b042de313301", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) 07:25:44 executing program 1: syslog(0x0, 0x0, 0x0) 07:25:44 executing program 0: syslog(0x4, 0x0, 0x0) 07:25:44 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) 07:25:44 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r0, 0x2}}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 1: syslog(0x0, 0x0, 0x0) 07:25:44 executing program 2: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 0: syslog(0x4, 0x0, 0x0) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 1: syslog(0x0, 0x0, 0x0) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 2: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "050239d183f1b399fd825299cc804181766d71fd162489285b9d2928693b0247fa3b8ffa1ea9fd6cd49db9f1296f2611863c453ae62f6153711777a45bffaaf3b521269a4b681356eb00f05f4c6fee1105a951b6fe5c478984f75b26702e13b28683f00218306f8ed7c72172bf6ca8a00d67d159356110ef3a636ce917653dae7056aebf484e71b5857d7760db79d580519d4f64ee81454c9d04ff56a60eb6e56b27957ec66e6cf5ad4f8baa4911bb4a154fec813bd509191ea9d89803814f8edcbdaaef7e227b3b70f9a8fedb890e2994bb3801b4a20b303cc35e4460077fc6744cd539a499864e91b62d9a27cbece30b4f37daf7201a15ed73b042de313301", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 2: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 2: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 07:25:44 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r0}}, 0x18) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "050239d183f1b399fd825299cc804181766d71fd162489285b9d2928693b0247fa3b8ffa1ea9fd6cd49db9f1296f2611863c453ae62f6153711777a45bffaaf3b521269a4b681356eb00f05f4c6fee1105a951b6fe5c478984f75b26702e13b28683f00218306f8ed7c72172bf6ca8a00d67d159356110ef3a636ce917653dae7056aebf484e71b5857d7760db79d580519d4f64ee81454c9d04ff56a60eb6e56b27957ec66e6cf5ad4f8baa4911bb4a154fec813bd509191ea9d89803814f8edcbdaaef7e227b3b70f9a8fedb890e2994bb3801b4a20b303cc35e4460077fc6744cd539a499864e91b62d9a27cbece30b4f37daf7201a15ed73b042de313301", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 07:25:44 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "050239d183f1b399fd825299cc804181766d71fd162489285b9d2928693b0247fa3b8ffa1ea9fd6cd49db9f1296f2611863c453ae62f6153711777a45bffaaf3b521269a4b681356eb00f05f4c6fee1105a951b6fe5c478984f75b26702e13b28683f00218306f8ed7c72172bf6ca8a00d67d159356110ef3a636ce917653dae7056aebf484e71b5857d7760db79d580519d4f64ee81454c9d04ff56a60eb6e56b27957ec66e6cf5ad4f8baa4911bb4a154fec813bd509191ea9d89803814f8edcbdaaef7e227b3b70f9a8fedb890e2994bb3801b4a20b303cc35e4460077fc6744cd539a499864e91b62d9a27cbece30b4f37daf7201a15ed73b042de313301", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 07:25:44 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r0}}, 0x18) 07:25:44 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={0x0, 0x0, 0x8}, 0x10) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r0}}, 0x18) 07:25:44 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00'}, 0x10) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='\x00', 0x0, 0x8}, 0x10) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x2, 0xffff, "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", 0x1, 0x7f, 0x7, 0x40, 0x8, 0x9, 0x6}}}, 0x120) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x5, @empty, 0x6}, {0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0xffffffffffffffff, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r2}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r8, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r7, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r7, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r9}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r10, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r9}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000300)={'tunl0\x00', r3, 0x40, 0x80, 0x40, 0xd9, {{0xe, 0x4, 0x1, 0x4, 0x38, 0x68, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x24, 0x52, 0x1, 0xf, [{@rand_addr=0x64010102, 0x5}, {@multicast1, 0x5}, {@local, 0x81}, {@loopback, 0x3}]}]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000a80)={&(0x7f00000003c0)={0x69c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x22, 0x0, 0x5}, {0x5, 0x3, 0x9, 0x6c}, {0x1f, 0x2, 0x4, 0x200}, {0xb0, 0x1, 0x3, 0x9}, {0x0, 0x8, 0x4, 0x9}, {0x0, 0x7, 0xa2, 0xfffffff8}, {0x0, 0x3, 0x3, 0x80}, {0xfffe, 0x10, 0x7, 0x6}]}}}]}}, {{0x8, 0x1, r2}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x274, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x80, 0x6, 0x0, 0xa1}, {0x8000, 0x6, 0x5, 0x7}, {0x400, 0xc6, 0xe0, 0x20}, {0x0, 0x80, 0xe0, 0x7}, {0x7, 0x0, 0x7c, 0x7}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x83ca}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r3}, {0x10c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x5, 0x1, 0x8}, {0x1, 0x3f, 0x1, 0x8}, {0x4, 0xe0, 0x20, 0xfffffff7}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x47}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3ef7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}]}, 0x69c}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000180)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0xd6, 0x80, 0x2, 0x80000001, {{0x1b, 0x4, 0x1, 0x8, 0x6c, 0x68, 0x0, 0x1, 0x4, 0x0, @empty, @private=0xa010102, {[@cipso={0x86, 0x13, 0x3, [{0x7, 0xd, "f5eca3be7e383a90770818"}]}, @rr={0x7, 0x2b, 0x7b, [@empty, @broadcast, @empty, @multicast1, @remote, @dev={0xac, 0x14, 0x14, 0xf}, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x40}, @private=0xa010100]}, @end, @lsrr={0x83, 0x17, 0x1d, [@initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x18}, @local, @dev={0xac, 0x14, 0x14, 0x2b}]}]}}}}}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000240), 0x6, 0x21c2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x4e21, @loopback}}}, 0x90) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r8, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r7, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r7, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r9}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r10, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r9}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000300)={'tunl0\x00', r3, 0x40, 0x80, 0x40, 0xd9, {{0xe, 0x4, 0x1, 0x4, 0x38, 0x68, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x24, 0x52, 0x1, 0xf, [{@rand_addr=0x64010102, 0x5}, {@multicast1, 0x5}, {@local, 0x81}, {@loopback, 0x3}]}]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000a80)={&(0x7f00000003c0)={0x69c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x22, 0x0, 0x5}, {0x5, 0x3, 0x9, 0x6c}, {0x1f, 0x2, 0x4, 0x200}, {0xb0, 0x1, 0x3, 0x9}, {0x0, 0x8, 0x4, 0x9}, {0x0, 0x7, 0xa2, 0xfffffff8}, {0x0, 0x3, 0x3, 0x80}, {0xfffe, 0x10, 0x7, 0x6}]}}}]}}, {{0x8, 0x1, r2}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x274, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x80, 0x6, 0x0, 0xa1}, {0x8000, 0x6, 0x5, 0x7}, {0x400, 0xc6, 0xe0, 0x20}, {0x0, 0x80, 0xe0, 0x7}, {0x7, 0x0, 0x7c, 0x7}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x83ca}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r3}, {0x10c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x5, 0x1, 0x8}, {0x1, 0x3f, 0x1, 0x8}, {0x4, 0xe0, 0x20, 0xfffffff7}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x47}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3ef7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}]}, 0x69c}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000180)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0xd6, 0x80, 0x2, 0x80000001, {{0x1b, 0x4, 0x1, 0x8, 0x6c, 0x68, 0x0, 0x1, 0x4, 0x0, @empty, @private=0xa010102, {[@cipso={0x86, 0x13, 0x3, [{0x7, 0xd, "f5eca3be7e383a90770818"}]}, @rr={0x7, 0x2b, 0x7b, [@empty, @broadcast, @empty, @multicast1, @remote, @dev={0xac, 0x14, 0x14, 0xf}, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x40}, @private=0xa010100]}, @end, @lsrr={0x83, 0x17, 0x1d, [@initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x18}, @local, @dev={0xac, 0x14, 0x14, 0x2b}]}]}}}}}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:44 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r0}}, 0x18) 07:25:44 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r0}}, 0x18) 07:25:44 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r8, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r7, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r7, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r9}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r10, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r9}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000300)={'tunl0\x00', r3, 0x40, 0x80, 0x40, 0xd9, {{0xe, 0x4, 0x1, 0x4, 0x38, 0x68, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x24, 0x52, 0x1, 0xf, [{@rand_addr=0x64010102, 0x5}, {@multicast1, 0x5}, {@local, 0x81}, {@loopback, 0x3}]}]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000a80)={&(0x7f00000003c0)={0x69c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x22, 0x0, 0x5}, {0x5, 0x3, 0x9, 0x6c}, {0x1f, 0x2, 0x4, 0x200}, {0xb0, 0x1, 0x3, 0x9}, {0x0, 0x8, 0x4, 0x9}, {0x0, 0x7, 0xa2, 0xfffffff8}, {0x0, 0x3, 0x3, 0x80}, {0xfffe, 0x10, 0x7, 0x6}]}}}]}}, {{0x8, 0x1, r2}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x274, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x80, 0x6, 0x0, 0xa1}, {0x8000, 0x6, 0x5, 0x7}, {0x400, 0xc6, 0xe0, 0x20}, {0x0, 0x80, 0xe0, 0x7}, {0x7, 0x0, 0x7c, 0x7}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x83ca}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r3}, {0x10c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x5, 0x1, 0x8}, {0x1, 0x3f, 0x1, 0x8}, {0x4, 0xe0, 0x20, 0xfffffff7}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x47}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3ef7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}]}, 0x69c}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000180)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0xd6, 0x80, 0x2, 0x80000001, {{0x1b, 0x4, 0x1, 0x8, 0x6c, 0x68, 0x0, 0x1, 0x4, 0x0, @empty, @private=0xa010102, {[@cipso={0x86, 0x13, 0x3, [{0x7, 0xd, "f5eca3be7e383a90770818"}]}, @rr={0x7, 0x2b, 0x7b, [@empty, @broadcast, @empty, @multicast1, @remote, @dev={0xac, 0x14, 0x14, 0xf}, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x40}, @private=0xa010100]}, @end, @lsrr={0x83, 0x17, 0x1d, [@initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x18}, @local, @dev={0xac, 0x14, 0x14, 0x2b}]}]}}}}}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:44 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r0}}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r0}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r0}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 07:25:44 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r0}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r8, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r7, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r7, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r9}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r10, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r9}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000300)={'tunl0\x00', r3, 0x40, 0x80, 0x40, 0xd9, {{0xe, 0x4, 0x1, 0x4, 0x38, 0x68, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x24, 0x52, 0x1, 0xf, [{@rand_addr=0x64010102, 0x5}, {@multicast1, 0x5}, {@local, 0x81}, {@loopback, 0x3}]}]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000a80)={&(0x7f00000003c0)={0x69c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x22, 0x0, 0x5}, {0x5, 0x3, 0x9, 0x6c}, {0x1f, 0x2, 0x4, 0x200}, {0xb0, 0x1, 0x3, 0x9}, {0x0, 0x8, 0x4, 0x9}, {0x0, 0x7, 0xa2, 0xfffffff8}, {0x0, 0x3, 0x3, 0x80}, {0xfffe, 0x10, 0x7, 0x6}]}}}]}}, {{0x8, 0x1, r2}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x274, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x80, 0x6, 0x0, 0xa1}, {0x8000, 0x6, 0x5, 0x7}, {0x400, 0xc6, 0xe0, 0x20}, {0x0, 0x80, 0xe0, 0x7}, {0x7, 0x0, 0x7c, 0x7}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x83ca}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r3}, {0x10c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x5, 0x1, 0x8}, {0x1, 0x3f, 0x1, 0x8}, {0x4, 0xe0, 0x20, 0xfffffff7}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x47}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3ef7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}]}, 0x69c}, 0x1, 0x0, 0x0, 0x40}, 0x80) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000180)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', r3, 0xd6, 0x80, 0x2, 0x80000001, {{0x1b, 0x4, 0x1, 0x8, 0x6c, 0x68, 0x0, 0x1, 0x4, 0x0, @empty, @private=0xa010102, {[@cipso={0x86, 0x13, 0x3, [{0x7, 0xd, "f5eca3be7e383a90770818"}]}, @rr={0x7, 0x2b, 0x7b, [@empty, @broadcast, @empty, @multicast1, @remote, @dev={0xac, 0x14, 0x14, 0xf}, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x40}, @private=0xa010100]}, @end, @lsrr={0x83, 0x17, 0x1d, [@initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x18}, @local, @dev={0xac, 0x14, 0x14, 0x2b}]}]}}}}}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:44 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r7, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r8, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r7, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r7, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r9}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r10, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r9}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000300)={'tunl0\x00', r3, 0x40, 0x80, 0x40, 0xd9, {{0xe, 0x4, 0x1, 0x4, 0x38, 0x68, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x24, 0x52, 0x1, 0xf, [{@rand_addr=0x64010102, 0x5}, {@multicast1, 0x5}, {@local, 0x81}, {@loopback, 0x3}]}]}}}}}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000a80)={&(0x7f00000003c0)={0x69c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x44, 0x4, [{0x1, 0x22, 0x0, 0x5}, {0x5, 0x3, 0x9, 0x6c}, {0x1f, 0x2, 0x4, 0x200}, {0xb0, 0x1, 0x3, 0x9}, {0x0, 0x8, 0x4, 0x9}, {0x0, 0x7, 0xa2, 0xfffffff8}, {0x0, 0x3, 0x3, 0x80}, {0xfffe, 0x10, 0x7, 0x6}]}}}]}}, {{0x8, 0x1, r2}, {0xbc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x274, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x80, 0x6, 0x0, 0xa1}, {0x8000, 0x6, 0x5, 0x7}, {0x400, 0xc6, 0xe0, 0x20}, {0x0, 0x80, 0xe0, 0x7}, {0x7, 0x0, 0x7c, 0x7}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x83ca}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r3}, {0x10c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x5, 0x1, 0x8}, {0x1, 0x3f, 0x1, 0x8}, {0x4, 0xe0, 0x20, 0xfffffff7}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x47}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3ef7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}]}, 0x69c}, 0x1, 0x0, 0x0, 0x40}, 0x80) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:44 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:44 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}}}, 0x38) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r7, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r6}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000380)={'ip_vti0\x00', &(0x7f0000000300)={'tunl0\x00', r2, 0x40, 0x80, 0x40, 0xd9, {{0xe, 0x4, 0x1, 0x4, 0x38, 0x68, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x24, 0x52, 0x1, 0xf, [{@rand_addr=0x64010102, 0x5}, {@multicast1, 0x5}, {@local, 0x81}, {@loopback, 0x3}]}]}}}}}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}}}, 0x38) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}}}, 0x38) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1, 0x2}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r6, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r5}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r0}}, 0x38) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r0}}, 0x38) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r0}}, 0x38) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), 0xffffffffffffffff, 0x2}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}}}, 0x38) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}}}, 0x38) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0x1, 0x58, &(0x7f0000000240)}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}}}, 0x38) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00'}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}}}, 0x38) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}}}, 0x38) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:45 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}}}, 0x38) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:45 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x0, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:45 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x0, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 2: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x0, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:45 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r0}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 2: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r0}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r0}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 2: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:45 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x732ec52b3ec21828}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440), r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {0x0, 0x1, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:45 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x4e24, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:45 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)={0x0, 'wlan0\x00'}, 0x18) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:45 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:45 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x3, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:45 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000400)=r5) 07:25:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00', 0x24}, r1}}, 0x38) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, r1}}, 0x38) 07:25:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000400)=r5) 07:25:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:46 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r0}}, 0x18) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x38) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:46 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r0}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000400)=r5) 07:25:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:46 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r0}}, 0x18) 07:25:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x38) 07:25:46 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) 07:25:46 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r0, 0x2}}, 0x18) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)) 07:25:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x38) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r2}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r2}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r7, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r6}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0x1, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000780)={0x510, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x1e8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xd216}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffa3c}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r2}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x148, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x5, 0x1, 0x1, 0x532}, {0x7, 0x7, 0xfd}, {0x1, 0x40, 0x3c, 0x10000}, {0xce16, 0x0, 0x4, 0xffff49ab}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}]}, 0x510}, 0x1, 0x0, 0x0, 0x8000}, 0x40030) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @ib_path={&(0x7f0000000280)=[{0x0, 0x0, [0x6, 0x1, 0xf69, 0x7, 0x7, 0x9, 0x5, 0x8, 0x200, 0x2, 0x1, 0x6, 0xfff, 0xffff8000, 0x7, 0x10001]}, {0x0, 0x0, [0x8, 0x5, 0x4, 0xffff8000, 0x3, 0x7, 0x401, 0xc9a5, 0xffff, 0x100, 0x401, 0x1f, 0x0, 0x9, 0x7f, 0x9]}, {0x0, 0x0, [0x1, 0x6, 0x1000, 0x6, 0x0, 0x3, 0xffff7fff, 0x20, 0x1, 0x1, 0x3ff, 0x0, 0xfffffffe, 0x4, 0xfffffffb, 0x3]}, {0x33, 0x0, [0x5, 0x7, 0x95, 0xbe24, 0xffff, 0x80, 0x2, 0x7fffffff, 0x8, 0x5, 0x0, 0x800005, 0x3, 0x8, 0x7, 0x300000]}, {0x5, 0x0, [0x8, 0x8, 0xfd, 0x0, 0x6, 0x7ff, 0x7, 0x3, 0x5, 0x7, 0xffff7fff, 0x1ff, 0x10001, 0x3, 0x6, 0x7fffffff]}, {0x1, 0x0, [0x2, 0x35, 0x9, 0x0, 0xfbd6, 0xfffffffe, 0xff, 0x0, 0x3, 0x6, 0x8, 0xd, 0xffff8001, 0x6, 0x46, 0x6]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r0, 0x2}}, 0x18) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:46 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6e, &(0x7f0000000000)=0x8, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r2}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r2}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r7, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r6}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0x1, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000780)={0x510, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x1e8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xd216}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffa3c}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r2}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x148, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x5, 0x1, 0x1, 0x532}, {0x7, 0x7, 0xfd}, {0x1, 0x40, 0x3c, 0x10000}, {0xce16, 0x0, 0x4, 0xffff49ab}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}]}, 0x510}, 0x1, 0x0, 0x0, 0x8000}, 0x40030) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @ib_path={&(0x7f0000000280)=[{0x0, 0x0, [0x6, 0x1, 0xf69, 0x7, 0x7, 0x9, 0x5, 0x8, 0x200, 0x2, 0x1, 0x6, 0xfff, 0xffff8000, 0x7, 0x10001]}, {0x0, 0x0, [0x8, 0x5, 0x4, 0xffff8000, 0x3, 0x7, 0x401, 0xc9a5, 0xffff, 0x100, 0x401, 0x1f, 0x0, 0x9, 0x7f, 0x9]}, {0x0, 0x0, [0x1, 0x6, 0x1000, 0x6, 0x0, 0x3, 0xffff7fff, 0x20, 0x1, 0x1, 0x3ff, 0x0, 0xfffffffe, 0x4, 0xfffffffb, 0x3]}, {0x33, 0x0, [0x5, 0x7, 0x95, 0xbe24, 0xffff, 0x80, 0x2, 0x7fffffff, 0x8, 0x5, 0x0, 0x800005, 0x3, 0x8, 0x7, 0x300000]}, {0x5, 0x0, [0x8, 0x8, 0xfd, 0x0, 0x6, 0x7ff, 0x7, 0x3, 0x5, 0x7, 0xffff7fff, 0x1ff, 0x10001, 0x3, 0x6, 0x7fffffff]}, {0x1, 0x0, [0x2, 0x35, 0x9, 0x0, 0xfbd6, 0xfffffffe, 0xff, 0x0, 0x3, 0x6, 0x8, 0xd, 0xffff8001, 0x6, 0x46, 0x6]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:46 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r0, 0x2}}, 0x18) 07:25:46 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6e, &(0x7f0000000000)=0x8, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r2}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r2}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r7, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r6}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0x1, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000780)={0x510, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x1e8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xd216}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffa3c}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r2}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x148, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x5, 0x1, 0x1, 0x532}, {0x7, 0x7, 0xfd}, {0x1, 0x40, 0x3c, 0x10000}, {0xce16, 0x0, 0x4, 0xffff49ab}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}]}, 0x510}, 0x1, 0x0, 0x0, 0x8000}, 0x40030) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @ib_path={&(0x7f0000000280)=[{0x0, 0x0, [0x6, 0x1, 0xf69, 0x7, 0x7, 0x9, 0x5, 0x8, 0x200, 0x2, 0x1, 0x6, 0xfff, 0xffff8000, 0x7, 0x10001]}, {0x0, 0x0, [0x8, 0x5, 0x4, 0xffff8000, 0x3, 0x7, 0x401, 0xc9a5, 0xffff, 0x100, 0x401, 0x1f, 0x0, 0x9, 0x7f, 0x9]}, {0x0, 0x0, [0x1, 0x6, 0x1000, 0x6, 0x0, 0x3, 0xffff7fff, 0x20, 0x1, 0x1, 0x3ff, 0x0, 0xfffffffe, 0x4, 0xfffffffb, 0x3]}, {0x33, 0x0, [0x5, 0x7, 0x95, 0xbe24, 0xffff, 0x80, 0x2, 0x7fffffff, 0x8, 0x5, 0x0, 0x800005, 0x3, 0x8, 0x7, 0x300000]}, {0x5, 0x0, [0x8, 0x8, 0xfd, 0x0, 0x6, 0x7ff, 0x7, 0x3, 0x5, 0x7, 0xffff7fff, 0x1ff, 0x10001, 0x3, 0x6, 0x7fffffff]}, {0x1, 0x0, [0x2, 0x35, 0x9, 0x0, 0xfbd6, 0xfffffffe, 0xff, 0x0, 0x3, 0x6, 0x8, 0xd, 0xffff8001, 0x6, 0x46, 0x6]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6e, &(0x7f0000000000)=0x8, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r6, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r5}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0x1, 0x58, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000780)={0x510, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x1e8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xd216}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffa3c}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r1}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x148, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r7}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x5, 0x1, 0x1, 0x532}, {0x7, 0x7, 0xfd}, {0x1, 0x40, 0x3c, 0x10000}, {0xce16, 0x0, 0x4, 0xffff49ab}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}]}, 0x510}, 0x1, 0x0, 0x0, 0x8000}, 0x40030) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6e, &(0x7f0000000000)=0x8, 0x4) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r6, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r5}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0x1, 0x58, &(0x7f00000006c0)}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:46 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6e, &(0x7f0000000000)=0x8, 0x4) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r6, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r5}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:46 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6e, &(0x7f0000000000)=0x8, 0x4) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r6, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r5}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280), r1}}, 0x18) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:46 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:46 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000040)=0x6b, 0x4) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, 0x0, 0x0) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) 07:25:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, 0x0, 0x0) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, 0x0, 0x0) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) 07:25:46 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x18) 07:25:46 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000040), 0x4) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) 07:25:46 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x2, &(0x7f0000000280)={0x0, 'geneve0\x00', 0x4}, 0x18) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 2: socket$l2tp(0x2, 0x2, 0x73) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x2, &(0x7f0000000280)={0x0, 'geneve0\x00', 0x4}, 0x18) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:46 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r1}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 2: syslog(0x3, &(0x7f0000000140)=""/98, 0x62) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1, 0x2}}, 0x18) 07:25:46 executing program 2: syslog(0x0, &(0x7f0000000140)=""/98, 0x62) 07:25:46 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x2, &(0x7f0000000280)={0x0, 'geneve0\x00', 0x4}, 0x18) 07:25:46 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:46 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 07:25:46 executing program 2: syslog(0x0, &(0x7f0000000140)=""/98, 0x62) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) 07:25:46 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r1}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x2, &(0x7f0000000040)={0x1, 'macsec0\x00', 0xffffffff}, 0x18) 07:25:46 executing program 2: syslog(0x0, &(0x7f0000000140)=""/98, 0x62) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 07:25:46 executing program 2: syslog(0x3, 0x0, 0x0) 07:25:46 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 07:25:46 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) getsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000440), &(0x7f0000000480)=0x4) 07:25:46 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:46 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) socket$inet_udplite(0x2, 0x2, 0x88) 07:25:46 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:47 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:47 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000004c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x10, 0x0, @ib={0x1b, 0x7fff, 0x1000, {"1ccd36ea82209a3233b6dde18d95b594"}, 0x50, 0xda, 0x8000}}}, 0x90) 07:25:47 executing program 2: syslog(0x3, 0x0, 0x0) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000480)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) 07:25:47 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 2: syslog(0x3, 0x0, 0x0) 07:25:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) 07:25:47 executing program 0: syslog(0x3, 0x0, 0x0) 07:25:47 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x2}}, 0x18) 07:25:47 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) 07:25:47 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 0: syslog(0x3, 0x0, 0x0) 07:25:47 executing program 3: msgget$private(0x0, 0x510) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {0x0, r1}}, 0x18) 07:25:47 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) 07:25:47 executing program 0: syslog(0x3, 0x0, 0x0) 07:25:47 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=0x0, @ANYBLOB="20002dbd7000f8dbdf250800000014001f000000000000000000000000000000000106001b004e240000"], 0x30}, 0x1, 0x0, 0x0, 0x40100}, 0x200c080) 07:25:47 executing program 3: msgget$private(0x0, 0x510) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 0: syslog(0x0, 0x0, 0x0) 07:25:47 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x2, &(0x7f0000000280)={0x0, 'geneve0\x00', 0x4}, 0x18) 07:25:47 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) 07:25:47 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) 07:25:47 executing program 3: msgget$private(0x0, 0x510) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 0: syslog(0x0, 0x0, 0x0) 07:25:47 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x2, &(0x7f0000000280)={0x0, 'geneve0\x00', 0x4}, 0x18) 07:25:47 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) 07:25:47 executing program 3: msgget$private(0x0, 0x510) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 0: syslog(0x0, 0x0, 0x0) 07:25:47 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x2, &(0x7f0000000280)={0x0, 'geneve0\x00', 0x4}, 0x18) 07:25:47 executing program 5: socket$l2tp(0x2, 0x2, 0x73) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) socket$inet_udplite(0x2, 0x2, 0x88) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:47 executing program 5: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r5, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="04000000000000002e0066696c653000"]) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) inotify_add_watch(r0, &(0x7f0000000300)='./file0\x00', 0x0) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x88, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0xffffffff, 0x3ff}) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100), 0x106, 0x4}}, 0x20) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) socket$inet_udplite(0x2, 0x2, 0x88) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x800, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40814) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}}}, 0x128) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400042, 0x0) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}}}, 0x128) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100), 0x106, 0x4}}, 0x20) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) syslog(0x3, &(0x7f0000000140)=""/98, 0x62) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}}}, 0x128) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r0}}, 0x128) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 4: syslog(0x3, &(0x7f0000000140)=""/98, 0x62) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r0}}, 0x128) 07:25:47 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 4: syslog(0x0, &(0x7f0000000140)=""/98, 0x62) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r0}}, 0x128) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 07:25:47 executing program 4: syslog(0x0, &(0x7f0000000140)=""/98, 0x62) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 07:25:47 executing program 4: syslog(0x0, &(0x7f0000000140)=""/98, 0x62) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) 07:25:47 executing program 2: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r1, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:47 executing program 4: syslog(0x3, 0x0, 0x0) 07:25:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 4: syslog(0x3, 0x0, 0x0) 07:25:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 1: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x7b, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x8, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 4: syslog(0x3, 0x0, 0x0) 07:25:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"3cb50845d48b9897e8320d85287a17ac"}, 0x9, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) socketpair(0xa, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0xffffffffffffff48, 0x13, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000051}, 0x1) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"3cb50845d48b9897e8320d85287a17ac"}, 0x0, 0x2fdd1862, 0xfff}}}, 0x90) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) socketpair(0xa, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0xffffffffffffff48, 0x13, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000051}, 0x1) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}}}, 0x128) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"3cb50845d48b9897e8320d85287a17ac"}, 0x0, 0x0, 0xfff}}}, 0x90) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) socketpair(0xa, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0xffffffffffffff48, 0x13, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000051}, 0x1) 07:25:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f00000002c0)) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}}}, 0x128) 07:25:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"3cb50845d48b9897e8320d85287a17ac"}}}}, 0x90) 07:25:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 4: socket$l2tp(0x2, 0x2, 0x73) socketpair(0xa, 0x5, 0x0, &(0x7f0000000000)) 07:25:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 07:25:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}}}, 0x128) 07:25:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 4: socketpair(0xa, 0x5, 0x0, &(0x7f0000000000)) 07:25:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 07:25:47 executing program 4: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}}}, 0x128) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f00000002c0)) 07:25:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 07:25:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}}}, 0x128) 07:25:47 executing program 4: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 07:25:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x9, @local, 0x6}}}, 0x30) 07:25:47 executing program 5: getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 07:25:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 5: getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:48 executing program 4: socketpair(0x0, 0x5, 0x0, &(0x7f0000000000)) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}}}, 0x128) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 5: getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 07:25:48 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 07:25:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 2: getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 07:25:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 2: getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x9, @local, 0x6}}}, 0x30) 07:25:48 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 07:25:48 executing program 2: getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000240), &(0x7f00000002c0)=0x4) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) r1 = socket(0x1f, 0x2, 0x5) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x2, &(0x7f0000000200)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r2}], &(0x7f0000000240)='GPL\x00', 0x80000001, 0x0, &(0x7f00000002c0), 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x8, 0xb, 0x8, 0x1}, 0x10}, 0x80) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {0x7fff}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)) socket(0x2, 0xa, 0x6ef) socket$l2tp(0x2, 0x2, 0x73) 07:25:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local, 0x6}}}, 0x30) 07:25:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f00000002c0)) 07:25:48 executing program 4: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 07:25:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @local}}}, 0x30) 07:25:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 07:25:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x3) 07:25:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x2) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 07:25:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, 0x0, 0x0) 07:25:48 executing program 4: socketpair(0xa, 0x5, 0x0, 0x0) 07:25:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x2) 07:25:48 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x3) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x1, 0x80, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 07:25:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 07:25:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x2) 07:25:48 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x3) 07:25:48 executing program 4: socketpair(0xa, 0x5, 0x0, 0x0) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) 07:25:48 executing program 3: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x3) 07:25:48 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00', 0x1000000}, 0x18) 07:25:48 executing program 4: socketpair(0xa, 0x5, 0x0, 0x0) 07:25:48 executing program 1: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x2) 07:25:48 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00', 0x1000000}, 0x18) 07:25:48 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x2800) 07:25:48 executing program 3: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x3) 07:25:48 executing program 1: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x2) 07:25:48 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x28) 07:25:48 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00', 0x1000000}, 0x18) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) 07:25:48 executing program 3: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x3) 07:25:48 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x28) 07:25:48 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x2800) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, 0x0, 0x0) 07:25:48 executing program 1: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x2) 07:25:48 executing program 2: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00', 0x1000000}, 0x18) 07:25:48 executing program 3: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x3) 07:25:48 executing program 1: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x2) 07:25:48 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x2800) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x1, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 2: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00', 0x1000000}, 0x18) 07:25:48 executing program 3: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x3) 07:25:48 executing program 5: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x2800) 07:25:48 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x28) 07:25:48 executing program 1: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x2) 07:25:48 executing program 2: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00', 0x1000000}, 0x18) 07:25:48 executing program 3: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x3) 07:25:48 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x28) 07:25:48 executing program 1: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x2) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x80, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 5: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x2800) 07:25:48 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x28) 07:25:48 executing program 2: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00', 0x1000000}, 0x18) 07:25:48 executing program 5: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x2800) 07:25:48 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, 0x0, 0x0) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0xff, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x4, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 2: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00', 0x1000000}, 0x18) 07:25:48 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x28) 07:25:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:48 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x2800) 07:25:48 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, 0x0, 0x0) 07:25:48 executing program 4: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x28) 07:25:48 executing program 2: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00', 0x1000000}, 0x18) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x3, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x2800) 07:25:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:48 executing program 4: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x28) 07:25:48 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:48 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x2800) 07:25:48 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, 0x0, 0x0) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0x0, 0x0, 0x0, 0x0, 0x3, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x300000000000000) 07:25:48 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:48 executing program 4: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x28) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:48 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:48 executing program 1: prctl$PR_GET_DUMPABLE(0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa}, {0x5}, {0x6, 0x4}]}, @fwd={0x3}, @datasec={0x6, 0x0, 0x0, 0xf, 0x2, [], "4e95"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], 'aN'}]}, {0x0, [0x0, 0x0, 0x61, 0x5f]}}, &(0x7f0000001440)=""/254, 0x82, 0xfe, 0x1}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) clock_gettime(0x6, &(0x7f0000000000)) 07:25:48 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) 07:25:48 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:48 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) 07:25:48 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1}, r1}}, 0x128) 07:25:48 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) 07:25:48 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) 07:25:48 executing program 1: prctl$PR_GET_DUMPABLE(0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa}, {0x5}, {0x6, 0x4}]}, @fwd={0x3}, @datasec={0x6, 0x0, 0x0, 0xf, 0x2, [], "4e95"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], 'aN'}]}, {0x0, [0x0, 0x0, 0x61, 0x5f]}}, &(0x7f0000001440)=""/254, 0x82, 0xfe, 0x1}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) clock_gettime(0x6, &(0x7f0000000000)) 07:25:48 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:48 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:48 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) 07:25:48 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x128) 07:25:48 executing program 3: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x29) 07:25:48 executing program 1: prctl$PR_GET_DUMPABLE(0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa}, {0x5}, {0x6, 0x4}]}, @fwd={0x3}, @datasec={0x6, 0x0, 0x0, 0xf, 0x2, [], "4e95"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], 'aN'}]}, {0x0, [0x0, 0x0, 0x61, 0x5f]}}, &(0x7f0000001440)=""/254, 0x82, 0xfe, 0x1}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) clock_gettime(0x6, &(0x7f0000000000)) 07:25:48 executing program 5: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:48 executing program 1: prctl$PR_GET_DUMPABLE(0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa}, {0x5}, {0x6, 0x4}]}, @fwd={0x3}, @datasec={0x6, 0x0, 0x0, 0xf, 0x2, [], "4e95"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], 'aN'}]}, {0x0, [0x0, 0x0, 0x61, 0x5f]}}, &(0x7f0000001440)=""/254, 0x82, 0xfe, 0x1}, 0x20) clock_gettime(0x6, &(0x7f0000000000)) 07:25:48 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2c, 0x0, 0x0) 07:25:48 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:48 executing program 3: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x29) 07:25:48 executing program 5: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:48 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) 07:25:48 executing program 3: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x29) 07:25:48 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x800) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) 07:25:48 executing program 1: prctl$PR_GET_DUMPABLE(0x3) clock_gettime(0x6, &(0x7f0000000000)) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 07:25:48 executing program 5: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:48 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) 07:25:48 executing program 3: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x29) 07:25:48 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x800) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) 07:25:48 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 07:25:48 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) 07:25:48 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:48 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) 07:25:48 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) 07:25:48 executing program 3: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x29) 07:25:48 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:48 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x800) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000240)={0xd, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) 07:25:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (fail_nth: 1) 07:25:48 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) 07:25:48 executing program 3: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x29) 07:25:48 executing program 4: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) 07:25:48 executing program 5: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:48 executing program 1: clock_gettime(0x6, 0x0) [ 481.517134][ T6649] FAULT_INJECTION: forcing a failure. [ 481.517134][ T6649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 481.530241][ T6649] CPU: 0 PID: 6649 Comm: syz-executor.0 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 481.541177][ T6649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.544428][ T6655] FAULT_INJECTION: forcing a failure. [ 481.544428][ T6655] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 481.551237][ T6649] Call Trace: [ 481.551247][ T6649] [ 481.570555][ T6649] dump_stack_lvl+0xd6/0x122 [ 481.575231][ T6649] dump_stack+0x11/0x12 [ 481.579424][ T6649] should_fail+0x230/0x240 [ 481.583873][ T6649] should_fail_usercopy+0x16/0x20 [ 481.589119][ T6649] _copy_from_user+0x1a/0xc0 [ 481.593789][ T6649] ucma_write+0xdc/0x230 [ 481.598173][ T6649] ? ucma_get_global_nl_info+0x50/0x50 [ 481.603660][ T6649] vfs_write+0x26d/0x890 [ 481.607954][ T6649] ? __rcu_read_unlock+0x4a/0x70 [ 481.612898][ T6649] ? __fget_files+0x1d2/0x210 [ 481.617615][ T6649] ksys_write+0xe8/0x1a0 [ 481.621853][ T6649] __x64_sys_write+0x3e/0x50 [ 481.626502][ T6649] do_syscall_64+0x2b/0x70 [ 481.630910][ T6649] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 481.636791][ T6649] RIP: 0033:0x7f73d60f40e9 [ 481.641200][ T6649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:25:48 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (fail_nth: 1) [ 481.660796][ T6649] RSP: 002b:00007f73d586a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 481.669205][ T6649] RAX: ffffffffffffffda RBX: 00007f73d6206f60 RCX: 00007f73d60f40e9 [ 481.677161][ T6649] RDX: 0000000000000128 RSI: 00000000200000c0 RDI: 0000000000000003 [ 481.685252][ T6649] RBP: 00007f73d586a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 481.693227][ T6649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 481.701182][ T6649] R13: 00007fff7463343f R14: 00007f73d586a300 R15: 0000000000022000 [ 481.709161][ T6649] 07:25:49 executing program 1: clock_gettime(0x6, 0x0) 07:25:49 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000425bd7000fbdbdf250300000008140500ac14b20be3fa14aa140002000000000000000000000000000000000114000300fe8000000000000000000000000000bb5350aa8e2fdb8ea7aecdfabf2e08b78412a28fffaeccd474647c76e9046cb2fea8ae0a6035bf8500f896a5c97edd5f905dd229869f5d8ec001b7f1c7db48fabb7d47f03140b15289f9d9426ee2e46d5470684842cfdb0099cd53315b689e1bb5c0082c79b6437de9eba192100fb7366e9c3cd04cc4824d2c503e94348293713cc0d04967290008c3fd1ae72ec8270082a69a6169e816ee8cffc6e180f2caaa1243d444976d769a163720e636d09b95dfb8d2026f0c089096ddc5ff661468937638fdbf938a"], 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x800) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 07:25:49 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:49 executing program 4: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) [ 481.712249][ T6655] CPU: 1 PID: 6655 Comm: syz-executor.3 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 481.723206][ T6655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.733256][ T6655] Call Trace: [ 481.736532][ T6655] [ 481.739482][ T6655] dump_stack_lvl+0xd6/0x122 [ 481.744082][ T6655] dump_stack+0x11/0x12 [ 481.748324][ T6655] should_fail+0x230/0x240 [ 481.752787][ T6655] should_fail_usercopy+0x16/0x20 [ 481.757837][ T6655] _copy_from_user+0x1a/0xc0 [ 481.762438][ T6655] ip_setsockopt+0x1d6/0x1ea0 07:25:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (fail_nth: 2) [ 481.767134][ T6655] ? selinux_socket_setsockopt+0x145/0x170 [ 481.773027][ T6655] sock_common_setsockopt+0x5d/0x70 [ 481.778235][ T6655] ? sock_common_recvmsg+0xe0/0xe0 [ 481.783352][ T6655] __sys_setsockopt+0x212/0x2b0 [ 481.788227][ T6655] __x64_sys_setsockopt+0x62/0x70 [ 481.793251][ T6655] do_syscall_64+0x2b/0x70 [ 481.797675][ T6655] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 481.803682][ T6655] RIP: 0033:0x7efd771980e9 [ 481.808095][ T6655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 481.827802][ T6655] RSP: 002b:00007efd7690e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 481.836229][ T6655] RAX: ffffffffffffffda RBX: 00007efd772aaf60 RCX: 00007efd771980e9 [ 481.844226][ T6655] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000003 [ 481.852285][ T6655] RBP: 00007efd7690e1d0 R08: 0000000000000029 R09: 0000000000000000 [ 481.860261][ T6655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 07:25:49 executing program 1: clock_gettime(0x6, 0x0) 07:25:49 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:49 executing program 4: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) [ 481.868238][ T6655] R13: 00007ffd8a6e706f R14: 00007efd7690e300 R15: 0000000000022000 [ 481.876381][ T6655] [ 481.897596][ T6672] FAULT_INJECTION: forcing a failure. [ 481.897596][ T6672] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 481.910703][ T6672] CPU: 1 PID: 6672 Comm: syz-executor.0 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 481.921646][ T6672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.931697][ T6672] Call Trace: [ 481.934976][ T6672] [ 481.937926][ T6672] dump_stack_lvl+0xd6/0x122 [ 481.942587][ T6672] dump_stack+0x11/0x12 [ 481.946751][ T6672] should_fail+0x230/0x240 [ 481.951175][ T6672] should_fail_usercopy+0x16/0x20 [ 481.956213][ T6672] _copy_from_user+0x1a/0xc0 [ 481.960815][ T6672] ucma_accept+0xc2/0x520 [ 481.965182][ T6672] ucma_write+0x198/0x230 [ 481.969525][ T6672] ? ucma_get_global_nl_info+0x50/0x50 [ 481.975070][ T6672] vfs_write+0x26d/0x890 [ 481.979448][ T6672] ? __rcu_read_unlock+0x4a/0x70 [ 481.984425][ T6672] ? __fget_files+0x1d2/0x210 [ 481.989111][ T6672] ksys_write+0xe8/0x1a0 [ 481.993377][ T6672] __x64_sys_write+0x3e/0x50 [ 481.998006][ T6672] do_syscall_64+0x2b/0x70 [ 482.002431][ T6672] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.008331][ T6672] RIP: 0033:0x7f73d60f40e9 [ 482.012751][ T6672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 482.032376][ T6672] RSP: 002b:00007f73d586a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 482.040794][ T6672] RAX: ffffffffffffffda RBX: 00007f73d6206f60 RCX: 00007f73d60f40e9 [ 482.048771][ T6672] RDX: 0000000000000128 RSI: 00000000200000c0 RDI: 0000000000000003 [ 482.056781][ T6672] RBP: 00007f73d586a1d0 R08: 0000000000000000 R09: 0000000000000000 07:25:49 executing program 4: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) 07:25:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (fail_nth: 3) 07:25:49 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (fail_nth: 1) 07:25:49 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (fail_nth: 2) 07:25:49 executing program 4: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) [ 482.064762][ T6672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.072746][ T6672] R13: 00007fff7463343f R14: 00007f73d586a300 R15: 0000000000022000 [ 482.080987][ T6672] [ 482.128165][ T6686] FAULT_INJECTION: forcing a failure. [ 482.128165][ T6686] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 482.141267][ T6686] CPU: 0 PID: 6686 Comm: syz-executor.0 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 482.152207][ T6686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.162349][ T6686] Call Trace: [ 482.165632][ T6686] [ 482.168571][ T6686] dump_stack_lvl+0xd6/0x122 [ 482.169862][ T6690] FAULT_INJECTION: forcing a failure. [ 482.169862][ T6690] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 482.173178][ T6686] dump_stack+0x11/0x12 [ 482.173205][ T6686] should_fail+0x230/0x240 [ 482.173228][ T6686] should_fail_usercopy+0x16/0x20 [ 482.200000][ T6686] _copy_to_user+0x1a/0x90 [ 482.204416][ T6686] simple_read_from_buffer+0xab/0x120 [ 482.209908][ T6686] proc_fail_nth_read+0x10d/0x150 [ 482.214927][ T6686] ? proc_fault_inject_write+0x230/0x230 [ 482.220550][ T6686] vfs_read+0x1a1/0x6a0 [ 482.224701][ T6686] ? __fget_files+0x1d2/0x210 [ 482.229371][ T6686] ksys_read+0xe8/0x1a0 [ 482.233629][ T6686] __x64_sys_read+0x3e/0x50 [ 482.238124][ T6686] do_syscall_64+0x2b/0x70 [ 482.242548][ T6686] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.248428][ T6686] RIP: 0033:0x7f73d60a6c9c [ 482.252834][ T6686] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 482.272430][ T6686] RSP: 002b:00007f73d586a160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 482.280835][ T6686] RAX: ffffffffffffffda RBX: 00007f73d6206f60 RCX: 00007f73d60a6c9c [ 482.288794][ T6686] RDX: 000000000000000f RSI: 00007f73d586a1e0 RDI: 0000000000000004 [ 482.296762][ T6686] RBP: 00007f73d586a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 482.304719][ T6686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.312678][ T6686] R13: 00007fff7463343f R14: 00007f73d586a300 R15: 0000000000022000 [ 482.320689][ T6686] 07:25:49 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x800) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:49 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x0) 07:25:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:49 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x800) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 482.323729][ T6690] CPU: 1 PID: 6690 Comm: syz-executor.3 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 482.334664][ T6690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.344717][ T6690] Call Trace: [ 482.347993][ T6690] [ 482.350916][ T6690] dump_stack_lvl+0xd6/0x122 [ 482.355579][ T6690] dump_stack+0x11/0x12 [ 482.359753][ T6690] should_fail+0x230/0x240 [ 482.364218][ T6690] should_fail_usercopy+0x16/0x20 [ 482.369248][ T6690] _copy_to_user+0x1a/0x90 [ 482.373734][ T6690] simple_read_from_buffer+0xab/0x120 07:25:49 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) (fail_nth: 1) [ 482.379181][ T6690] proc_fail_nth_read+0x10d/0x150 [ 482.384287][ T6690] ? proc_fault_inject_write+0x230/0x230 [ 482.389934][ T6690] vfs_read+0x1a1/0x6a0 [ 482.394191][ T6690] ? __fget_files+0x1d2/0x210 [ 482.398930][ T6690] ksys_read+0xe8/0x1a0 [ 482.403163][ T6690] __x64_sys_read+0x3e/0x50 [ 482.407810][ T6690] do_syscall_64+0x2b/0x70 [ 482.412236][ T6690] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.418208][ T6690] RIP: 0033:0x7efd7714ac9c [ 482.422618][ T6690] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 482.442351][ T6690] RSP: 002b:00007efd7690e160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 482.450804][ T6690] RAX: ffffffffffffffda RBX: 00007efd772aaf60 RCX: 00007efd7714ac9c [ 482.458781][ T6690] RDX: 000000000000000f RSI: 00007efd7690e1e0 RDI: 0000000000000004 [ 482.466781][ T6690] RBP: 00007efd7690e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 482.474755][ T6690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.482825][ T6690] R13: 00007ffd8a6e706f R14: 00007efd7690e300 R15: 0000000000022000 [ 482.490933][ T6690] [ 482.508825][ T6702] FAULT_INJECTION: forcing a failure. [ 482.508825][ T6702] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 482.512534][ T6700] FAULT_INJECTION: forcing a failure. [ 482.512534][ T6700] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 482.522035][ T6702] CPU: 0 PID: 6702 Comm: syz-executor.4 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 482.546016][ T6702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.556064][ T6702] Call Trace: [ 482.559331][ T6702] [ 482.562250][ T6702] dump_stack_lvl+0xd6/0x122 [ 482.566844][ T6702] dump_stack+0x11/0x12 [ 482.570991][ T6702] should_fail+0x230/0x240 [ 482.575436][ T6702] should_fail_usercopy+0x16/0x20 [ 482.580458][ T6702] _copy_from_user+0x1a/0xc0 [ 482.585038][ T6702] ip_setsockopt+0x25a/0x1ea0 [ 482.589707][ T6702] sock_common_setsockopt+0x5d/0x70 [ 482.594975][ T6702] ? sock_common_recvmsg+0xe0/0xe0 [ 482.600082][ T6702] __sys_setsockopt+0x212/0x2b0 [ 482.605708][ T6702] __x64_sys_setsockopt+0x62/0x70 [ 482.610749][ T6702] do_syscall_64+0x2b/0x70 [ 482.615158][ T6702] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.621041][ T6702] RIP: 0033:0x7f15252790e9 [ 482.625530][ T6702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 482.645144][ T6702] RSP: 002b:00007f15249ef168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 482.653544][ T6702] RAX: ffffffffffffffda RBX: 00007f152538bf60 RCX: 00007f15252790e9 [ 482.661586][ T6702] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000003 [ 482.669539][ T6702] RBP: 00007f15249ef1d0 R08: 0000000000000003 R09: 0000000000000000 [ 482.677497][ T6702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.685590][ T6702] R13: 00007fff8b39946f R14: 00007f15249ef300 R15: 0000000000022000 [ 482.693580][ T6702] [ 482.696586][ T6700] CPU: 1 PID: 6700 Comm: syz-executor.1 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 482.707609][ T6700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.717666][ T6700] Call Trace: [ 482.720942][ T6700] [ 482.723870][ T6700] dump_stack_lvl+0xd6/0x122 [ 482.728504][ T6700] dump_stack+0x11/0x12 [ 482.732728][ T6700] should_fail+0x230/0x240 [ 482.737183][ T6700] should_fail_usercopy+0x16/0x20 [ 482.742220][ T6700] _copy_to_user+0x1a/0x90 [ 482.746645][ T6700] put_timespec64+0x51/0x90 [ 482.751180][ T6700] __x64_sys_clock_gettime+0x131/0x170 [ 482.756649][ T6700] do_syscall_64+0x2b/0x70 [ 482.761127][ T6700] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 482.767091][ T6700] RIP: 0033:0x7fa9b67bc0e9 [ 482.771512][ T6700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 482.791261][ T6700] RSP: 002b:00007fa9b5f32168 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 482.799775][ T6700] RAX: ffffffffffffffda RBX: 00007fa9b68cef60 RCX: 00007fa9b67bc0e9 [ 482.807850][ T6700] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000006 [ 482.815826][ T6700] RBP: 00007fa9b5f321d0 R08: 0000000000000000 R09: 0000000000000000 07:25:50 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) 07:25:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0xd, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:50 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) 07:25:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x16, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 482.823852][ T6700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.831826][ T6700] R13: 00007ffce830222f R14: 00007fa9b5f32300 R15: 0000000000022000 [ 482.839809][ T6700] 07:25:50 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (fail_nth: 2) 07:25:50 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) 07:25:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x128, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:50 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) 07:25:50 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) (fail_nth: 2) 07:25:50 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000425bd7000fbdbdf250300000008140500ac14b20be3fa14aa140002000000000000000000000000000000000114000300fe8000000000000000000000000000bb5350aa8e2fdb8ea7aecdfabf2e08b78412a28fffaeccd474647c76e9046cb2fea8ae0a6035bf8500f896a5c97edd5f905dd229869f5d8ec001b7f1c7db48fabb7d47f03140b15289f9d9426ee2e46d5470684842cfdb0099cd53315b689e1bb5c0082c79b6437de9eba192100fb7366e9c3cd04cc4824d2c503e94348293713cc0d04967290008c3fd1ae72ec8270082a69a6169e816ee8cffc6e180f2caaa1243d444976d769a163720e636d09b95dfb8d2026f0c089096ddc5ff661468937638fdbf938a"], 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x800) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:50 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (fail_nth: 1) 07:25:50 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) [ 482.940902][ T6725] FAULT_INJECTION: forcing a failure. [ 482.940902][ T6725] name failslab, interval 1, probability 0, space 0, times 0 [ 482.953558][ T6725] CPU: 0 PID: 6725 Comm: syz-executor.5 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 482.958027][ T6727] FAULT_INJECTION: forcing a failure. [ 482.958027][ T6727] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 482.964488][ T6725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.987752][ T6725] Call Trace: [ 482.991032][ T6725] [ 482.993947][ T6725] dump_stack_lvl+0xd6/0x122 [ 482.998593][ T6725] dump_stack+0x11/0x12 [ 483.002860][ T6725] should_fail+0x230/0x240 [ 483.007271][ T6725] ? ip_options_get+0x4d/0x310 [ 483.012023][ T6725] __should_failslab+0x81/0x90 [ 483.016775][ T6725] should_failslab+0x5/0x20 [ 483.021270][ T6725] __kmalloc+0x66/0x350 [ 483.025417][ T6725] ip_options_get+0x4d/0x310 [ 483.029997][ T6725] ? lock_sock_nested+0x106/0x130 [ 483.035077][ T6725] ip_setsockopt+0x1275/0x1ea0 [ 483.039827][ T6725] ? selinux_socket_setsockopt+0x145/0x170 [ 483.045637][ T6725] sock_common_setsockopt+0x5d/0x70 [ 483.050824][ T6725] ? sock_common_recvmsg+0xe0/0xe0 [ 483.055961][ T6725] __sys_setsockopt+0x212/0x2b0 [ 483.060802][ T6725] __x64_sys_setsockopt+0x62/0x70 [ 483.065815][ T6725] do_syscall_64+0x2b/0x70 [ 483.070221][ T6725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 483.076106][ T6725] RIP: 0033:0x7fe14b0f50e9 [ 483.080507][ T6725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 483.100101][ T6725] RSP: 002b:00007fe14a86b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 483.108501][ T6725] RAX: ffffffffffffffda RBX: 00007fe14b207f60 RCX: 00007fe14b0f50e9 [ 483.116470][ T6725] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 483.124435][ T6725] RBP: 00007fe14a86b1d0 R08: 0000000000000018 R09: 0000000000000000 [ 483.132397][ T6725] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000001 07:25:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x3f00, {0x0, 0x0, "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"}, r1}}, 0x128) [ 483.140354][ T6725] R13: 00007ffecb0fda4f R14: 00007fe14a86b300 R15: 0000000000022000 [ 483.148317][ T6725] [ 483.151323][ T6727] CPU: 1 PID: 6727 Comm: syz-executor.1 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 483.162339][ T6727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.172399][ T6727] Call Trace: [ 483.175676][ T6727] [ 483.178605][ T6727] dump_stack_lvl+0xd6/0x122 [ 483.183209][ T6727] dump_stack+0x11/0x12 [ 483.187381][ T6727] should_fail+0x230/0x240 [ 483.191862][ T6727] __alloc_pages+0xf0/0x320 [ 483.196377][ T6727] alloc_pages+0x34d/0x450 [ 483.200833][ T6727] __pmd_alloc+0x47/0x300 [ 483.205202][ T6727] handle_mm_fault+0x9c5/0xa40 [ 483.210038][ T6727] do_user_addr_fault+0x4cd/0x940 [ 483.215076][ T6727] exc_page_fault+0x60/0x160 [ 483.219682][ T6727] asm_exc_page_fault+0x1e/0x30 [ 483.224645][ T6727] RIP: 0010:copy_user_generic_unrolled+0x89/0xd0 07:25:50 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x800) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r1) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 483.230990][ T6727] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 483.250680][ T6727] RSP: 0018:ffffc90002603ea0 EFLAGS: 00050202 [ 483.256750][ T6727] RAX: ffff88811d2badf8 RBX: 00007fffffffeff0 RCX: 0000000000000002 [ 483.264734][ T6727] RDX: 0000000000000000 RSI: ffffc90002603ed0 RDI: 0000000020000000 [ 483.272926][ T6727] RBP: 0000000000000000 R08: 00000000000001e2 R09: 0000000000000000 [ 483.280901][ T6727] R10: 0001c90002603ed0 R11: 0001c90002603edf R12: 0000000000000010 [ 483.288943][ T6727] R13: 0000000000000000 R14: 0000000020000000 R15: ffffc90002603ed0 [ 483.296923][ T6727] _copy_to_user+0x72/0x90 [ 483.301421][ T6727] put_timespec64+0x51/0x90 [ 483.305942][ T6727] __x64_sys_clock_gettime+0x131/0x170 [ 483.311409][ T6727] do_syscall_64+0x2b/0x70 [ 483.315999][ T6727] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 483.321900][ T6727] RIP: 0033:0x7fa9b67bc0e9 07:25:50 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x800) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 483.326313][ T6727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 483.345923][ T6727] RSP: 002b:00007fa9b5f32168 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 483.354380][ T6727] RAX: ffffffffffffffda RBX: 00007fa9b68cef60 RCX: 00007fa9b67bc0e9 [ 483.362355][ T6727] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000006 [ 483.370333][ T6727] RBP: 00007fa9b5f321d0 R08: 0000000000000000 R09: 0000000000000000 [ 483.378315][ T6727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 07:25:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x3f000000, {0x0, 0x0, "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"}, r1}}, 0x128) [ 483.386302][ T6727] R13: 00007ffce830222f R14: 00007fa9b5f32300 R15: 0000000000022000 [ 483.394284][ T6727] [ 483.397796][ T6721] FAULT_INJECTION: forcing a failure. [ 483.397796][ T6721] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 483.410926][ T6721] CPU: 1 PID: 6721 Comm: syz-executor.4 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 483.421952][ T6721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.432007][ T6721] Call Trace: [ 483.435382][ T6721] [ 483.438309][ T6721] dump_stack_lvl+0xd6/0x122 07:25:50 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (fail_nth: 3) 07:25:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x3f00000000000000, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:50 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 483.442918][ T6721] dump_stack+0x11/0x12 [ 483.447149][ T6721] should_fail+0x230/0x240 [ 483.451581][ T6721] should_fail_usercopy+0x16/0x20 [ 483.456651][ T6721] _copy_to_user+0x1a/0x90 [ 483.461096][ T6721] simple_read_from_buffer+0xab/0x120 [ 483.466489][ T6721] proc_fail_nth_read+0x10d/0x150 [ 483.471550][ T6721] ? proc_fault_inject_write+0x230/0x230 [ 483.477200][ T6721] vfs_read+0x1a1/0x6a0 [ 483.481568][ T6721] ? __fget_files+0x1d2/0x210 [ 483.486317][ T6721] ksys_read+0xe8/0x1a0 07:25:50 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 483.490574][ T6721] __x64_sys_read+0x3e/0x50 [ 483.495089][ T6721] do_syscall_64+0x2b/0x70 [ 483.499517][ T6721] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 483.505430][ T6721] RIP: 0033:0x7f152522bc9c [ 483.509859][ T6721] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 483.529477][ T6721] RSP: 002b:00007f15249ef160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 483.537924][ T6721] RAX: ffffffffffffffda RBX: 00007f152538bf60 RCX: 00007f152522bc9c [ 483.545904][ T6721] RDX: 000000000000000f RSI: 00007f15249ef1e0 RDI: 0000000000000004 [ 483.553885][ T6721] RBP: 00007f15249ef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 483.561865][ T6721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 483.569846][ T6721] R13: 00007fff8b39946f R14: 00007f15249ef300 R15: 0000000000022000 [ 483.577905][ T6721] 07:25:51 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:51 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r2, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)={0x28, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 483.606568][ T6754] FAULT_INJECTION: forcing a failure. [ 483.606568][ T6754] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 483.619920][ T6754] CPU: 1 PID: 6754 Comm: syz-executor.1 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 483.630864][ T6754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.640921][ T6754] Call Trace: [ 483.644207][ T6754] [ 483.647262][ T6754] dump_stack_lvl+0xd6/0x122 [ 483.651869][ T6754] dump_stack+0x11/0x12 [ 483.656089][ T6754] should_fail+0x230/0x240 [ 483.660556][ T6754] __alloc_pages+0xf0/0x320 [ 483.665069][ T6754] alloc_pages+0x34d/0x450 [ 483.669493][ T6754] pte_alloc_one+0x29/0xb0 [ 483.673922][ T6754] __pte_alloc+0x2f/0x1f0 [ 483.678262][ T6754] do_anonymous_page+0x7a0/0xa10 [ 483.683228][ T6754] ? preempt_count_add+0x5e/0xa0 [ 483.688248][ T6754] ? _raw_spin_unlock+0x2d/0x50 [ 483.693105][ T6754] ? __pmd_alloc+0x2cb/0x300 [ 483.697708][ T6754] handle_mm_fault+0x83c/0xa40 [ 483.702618][ T6754] do_user_addr_fault+0x4cd/0x940 [ 483.707781][ T6754] exc_page_fault+0x60/0x160 [ 483.712439][ T6754] asm_exc_page_fault+0x1e/0x30 [ 483.717319][ T6754] RIP: 0010:copy_user_generic_unrolled+0x89/0xd0 [ 483.723666][ T6754] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 483.743282][ T6754] RSP: 0018:ffffc9000bf57ea0 EFLAGS: 00050202 [ 483.749363][ T6754] RAX: ffff88811d3a5938 RBX: 00007fffffffeff0 RCX: 0000000000000002 [ 483.757341][ T6754] RDX: 0000000000000000 RSI: ffffc9000bf57ed0 RDI: 0000000020000000 [ 483.765314][ T6754] RBP: 0000000000000000 R08: 00000000000001e3 R09: 0000000000000000 [ 483.773288][ T6754] R10: 0001c9000bf57ed0 R11: 0001c9000bf57edf R12: 0000000000000010 [ 483.781336][ T6754] R13: 0000000000000000 R14: 0000000020000000 R15: ffffc9000bf57ed0 [ 483.789319][ T6754] _copy_to_user+0x72/0x90 [ 483.793781][ T6754] put_timespec64+0x51/0x90 [ 483.798301][ T6754] __x64_sys_clock_gettime+0x131/0x170 [ 483.803925][ T6754] do_syscall_64+0x2b/0x70 [ 483.808414][ T6754] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 483.814395][ T6754] RIP: 0033:0x7fa9b67bc0e9 [ 483.818872][ T6754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 483.838608][ T6754] RSP: 002b:00007fa9b5f32168 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 483.847076][ T6754] RAX: ffffffffffffffda RBX: 00007fa9b68cef60 RCX: 00007fa9b67bc0e9 07:25:51 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (fail_nth: 2) 07:25:51 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x10, 0x3, 0x0, 0x29) 07:25:51 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x3f00, 0x0, "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"}, r1}}, 0x128) 07:25:51 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) [ 483.855050][ T6754] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000006 [ 483.863023][ T6754] RBP: 00007fa9b5f321d0 R08: 0000000000000000 R09: 0000000000000000 [ 483.870999][ T6754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 483.879024][ T6754] R13: 00007ffce830222f R14: 00007fa9b5f32300 R15: 0000000000022000 [ 483.887003][ T6754] 07:25:51 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x3f000000, 0x0, "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"}, r1}}, 0x128) [ 483.931726][ T6767] FAULT_INJECTION: forcing a failure. [ 483.931726][ T6767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 483.944890][ T6767] CPU: 1 PID: 6767 Comm: syz-executor.5 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 483.955950][ T6767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.966003][ T6767] Call Trace: [ 483.969285][ T6767] [ 483.972220][ T6767] dump_stack_lvl+0xd6/0x122 [ 483.976822][ T6767] dump_stack+0x11/0x12 07:25:51 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:51 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (fail_nth: 4) 07:25:51 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x21, 0x3, 0x0, 0x29) 07:25:51 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x10, 0x3, 0x0, 0x3) 07:25:51 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r1, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 483.980985][ T6767] should_fail+0x230/0x240 [ 483.985418][ T6767] should_fail_usercopy+0x16/0x20 [ 483.990539][ T6767] _copy_from_user+0x1a/0xc0 [ 483.995149][ T6767] ip_options_get+0xd3/0x310 [ 483.999756][ T6767] ip_setsockopt+0x1275/0x1ea0 [ 484.004590][ T6767] ? selinux_socket_setsockopt+0x145/0x170 [ 484.010565][ T6767] sock_common_setsockopt+0x5d/0x70 [ 484.015788][ T6767] ? sock_common_recvmsg+0xe0/0xe0 [ 484.021024][ T6767] __sys_setsockopt+0x212/0x2b0 [ 484.025897][ T6767] __x64_sys_setsockopt+0x62/0x70 [ 484.030931][ T6767] do_syscall_64+0x2b/0x70 [ 484.035409][ T6767] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 484.041300][ T6767] RIP: 0033:0x7fe14b0f50e9 [ 484.045705][ T6767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 484.062790][ T6778] FAULT_INJECTION: forcing a failure. [ 484.062790][ T6778] name failslab, interval 1, probability 0, space 0, times 0 [ 484.065328][ T6767] RSP: 002b:00007fe14a86b168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 484.065367][ T6767] RAX: ffffffffffffffda RBX: 00007fe14b207f60 RCX: 00007fe14b0f50e9 [ 484.094332][ T6767] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 484.102291][ T6767] RBP: 00007fe14a86b1d0 R08: 0000000000000018 R09: 0000000000000000 [ 484.110248][ T6767] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000001 [ 484.118216][ T6767] R13: 00007ffecb0fda4f R14: 00007fe14a86b300 R15: 0000000000022000 [ 484.126177][ T6767] [ 484.129242][ T6778] CPU: 0 PID: 6778 Comm: syz-executor.1 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 484.140181][ T6778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.150244][ T6778] Call Trace: [ 484.153520][ T6778] [ 484.156451][ T6778] dump_stack_lvl+0xd6/0x122 [ 484.161107][ T6778] dump_stack+0x11/0x12 [ 484.165280][ T6778] should_fail+0x230/0x240 [ 484.169758][ T6778] __should_failslab+0x81/0x90 [ 484.174532][ T6778] ? __anon_vma_prepare+0x44/0x2a0 [ 484.179832][ T6778] should_failslab+0x5/0x20 [ 484.184347][ T6778] kmem_cache_alloc+0x46/0x300 [ 484.189113][ T6778] __anon_vma_prepare+0x44/0x2a0 [ 484.194118][ T6778] do_anonymous_page+0x7c1/0xa10 [ 484.199155][ T6778] ? preempt_count_add+0x5e/0xa0 [ 484.204106][ T6778] ? _raw_spin_unlock+0x2d/0x50 [ 484.209006][ T6778] ? __pmd_alloc+0x2cb/0x300 [ 484.213661][ T6778] handle_mm_fault+0x83c/0xa40 [ 484.218492][ T6778] do_user_addr_fault+0x4cd/0x940 [ 484.223522][ T6778] exc_page_fault+0x60/0x160 [ 484.228147][ T6778] asm_exc_page_fault+0x1e/0x30 07:25:51 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x3f00, "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"}, r1}}, 0x128) 07:25:51 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (fail_nth: 3) 07:25:51 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x21, 0x3, 0x0, 0x3) 07:25:51 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x29, 0x3, 0x0, 0x29) 07:25:51 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r1, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 484.233010][ T6778] RIP: 0010:copy_user_generic_unrolled+0x89/0xd0 [ 484.239353][ T6778] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 484.258969][ T6778] RSP: 0018:ffffc9000c0cbea0 EFLAGS: 00050202 [ 484.265052][ T6778] RAX: ffff88811ca28b78 RBX: 00007fffffffeff0 RCX: 0000000000000002 [ 484.273028][ T6778] RDX: 0000000000000000 RSI: ffffc9000c0cbed0 RDI: 0000000020000000 07:25:51 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x2900, 0x3, 0x0, 0x29) [ 484.281001][ T6778] RBP: 0000000000000000 R08: 00000000000001e4 R09: 0000000000000000 [ 484.289022][ T6778] R10: 0001c9000c0cbed0 R11: 0001c9000c0cbedf R12: 0000000000000010 [ 484.297011][ T6778] R13: 0000000000000000 R14: 0000000020000000 R15: ffffc9000c0cbed0 [ 484.305041][ T6778] _copy_to_user+0x72/0x90 [ 484.309661][ T6778] put_timespec64+0x51/0x90 [ 484.314233][ T6778] __x64_sys_clock_gettime+0x131/0x170 [ 484.319694][ T6778] do_syscall_64+0x2b/0x70 [ 484.324165][ T6778] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 484.330074][ T6778] RIP: 0033:0x7fa9b67bc0e9 [ 484.334491][ T6778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 484.354116][ T6778] RSP: 002b:00007fa9b5f32168 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 484.362622][ T6778] RAX: ffffffffffffffda RBX: 00007fa9b68cef60 RCX: 00007fa9b67bc0e9 [ 484.370594][ T6778] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000006 07:25:51 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x3f000000, "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"}, r1}}, 0x128) 07:25:51 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x60ff, 0x3, 0x0, 0x29) [ 484.378687][ T6778] RBP: 00007fa9b5f321d0 R08: 0000000000000000 R09: 0000000000000000 [ 484.386809][ T6778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 484.394785][ T6778] R13: 00007ffce830222f R14: 00007fa9b5f32300 R15: 0000000000022000 [ 484.402837][ T6778] [ 484.448956][ T6797] FAULT_INJECTION: forcing a failure. [ 484.448956][ T6797] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 484.462057][ T6797] CPU: 0 PID: 6797 Comm: syz-executor.5 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 484.472994][ T6797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.483120][ T6797] Call Trace: [ 484.486407][ T6797] [ 484.489347][ T6797] dump_stack_lvl+0xd6/0x122 [ 484.493956][ T6797] dump_stack+0x11/0x12 [ 484.498119][ T6797] should_fail+0x230/0x240 [ 484.502582][ T6797] should_fail_usercopy+0x16/0x20 [ 484.507666][ T6797] _copy_to_user+0x1a/0x90 [ 484.512095][ T6797] simple_read_from_buffer+0xab/0x120 [ 484.517610][ T6797] proc_fail_nth_read+0x10d/0x150 [ 484.522652][ T6797] ? proc_fault_inject_write+0x230/0x230 [ 484.528346][ T6797] vfs_read+0x1a1/0x6a0 [ 484.532543][ T6797] ? __fget_files+0x1d2/0x210 [ 484.537239][ T6797] ksys_read+0xe8/0x1a0 [ 484.541419][ T6797] __x64_sys_read+0x3e/0x50 [ 484.545937][ T6797] do_syscall_64+0x2b/0x70 [ 484.550429][ T6797] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 484.556388][ T6797] RIP: 0033:0x7fe14b0a7c9c [ 484.560807][ T6797] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 484.580443][ T6797] RSP: 002b:00007fe14a86b160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 484.588866][ T6797] RAX: ffffffffffffffda RBX: 00007fe14b207f60 RCX: 00007fe14b0a7c9c 07:25:52 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (fail_nth: 5) 07:25:52 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x29, 0x3, 0x0, 0x3) 07:25:52 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r1, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, ']('}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x27, 0xa, '/proc/sys/net/ipv4/vs/sync_version\x00'}, @NBD_ATTR_BACKEND_IDENTIFIER={0x6, 0xa, '}:'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x9c}, 0x1, 0x0, 0x0, 0x20000081}, 0x8011) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0xf0ff1f, 0x3, 0x0, 0x29) 07:25:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x1000000, 0x3, 0x0, 0x29) 07:25:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) [ 484.596846][ T6797] RDX: 000000000000000f RSI: 00007fe14a86b1e0 RDI: 0000000000000004 [ 484.604919][ T6797] RBP: 00007fe14a86b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 484.612900][ T6797] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000001 [ 484.620947][ T6797] R13: 00007ffecb0fda4f R14: 00007fe14a86b300 R15: 0000000000022000 [ 484.628941][ T6797] 07:25:52 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x2900, 0x3, 0x0, 0x3) 07:25:52 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) [ 484.675786][ T6810] FAULT_INJECTION: forcing a failure. [ 484.675786][ T6810] name failslab, interval 1, probability 0, space 0, times 0 [ 484.688445][ T6810] CPU: 0 PID: 6810 Comm: syz-executor.1 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 484.699454][ T6810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.709643][ T6810] Call Trace: [ 484.712921][ T6810] [ 484.715853][ T6810] dump_stack_lvl+0xd6/0x122 [ 484.720530][ T6810] dump_stack+0x11/0x12 07:25:52 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 484.724793][ T6810] should_fail+0x230/0x240 [ 484.729222][ T6810] __should_failslab+0x81/0x90 [ 484.733992][ T6810] ? __anon_vma_prepare+0x92/0x2a0 [ 484.739175][ T6810] should_failslab+0x5/0x20 [ 484.743686][ T6810] kmem_cache_alloc+0x46/0x300 [ 484.748459][ T6810] ? __anon_vma_prepare+0x44/0x2a0 [ 484.753776][ T6810] __anon_vma_prepare+0x92/0x2a0 [ 484.758726][ T6810] do_anonymous_page+0x7c1/0xa10 [ 484.763671][ T6810] ? preempt_count_add+0x5e/0xa0 [ 484.768618][ T6810] ? _raw_spin_unlock+0x2d/0x50 [ 484.773468][ T6810] ? __pmd_alloc+0x2cb/0x300 [ 484.778161][ T6810] handle_mm_fault+0x83c/0xa40 [ 484.782974][ T6810] do_user_addr_fault+0x4cd/0x940 [ 484.788011][ T6810] exc_page_fault+0x60/0x160 [ 484.792603][ T6810] asm_exc_page_fault+0x1e/0x30 [ 484.797462][ T6810] RIP: 0010:copy_user_generic_unrolled+0x89/0xd0 [ 484.803905][ T6810] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 484.823532][ T6810] RSP: 0018:ffffc9000c233ea0 EFLAGS: 00050202 [ 484.829600][ T6810] RAX: ffff888104adb478 RBX: 00007fffffffeff0 RCX: 0000000000000002 [ 484.837576][ T6810] RDX: 0000000000000000 RSI: ffffc9000c233ed0 RDI: 0000000020000000 [ 484.845550][ T6810] RBP: 0000000000000000 R08: 00000000000001e4 R09: 0000000000000000 [ 484.853593][ T6810] R10: 0001c9000c233ed0 R11: 0001c9000c233edf R12: 0000000000000010 [ 484.861574][ T6810] R13: 0000000000000000 R14: 0000000020000000 R15: ffffc9000c233ed0 [ 484.869575][ T6810] _copy_to_user+0x72/0x90 [ 484.874157][ T6810] put_timespec64+0x51/0x90 [ 484.878676][ T6810] __x64_sys_clock_gettime+0x131/0x170 [ 484.884148][ T6810] do_syscall_64+0x2b/0x70 [ 484.888588][ T6810] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 484.894491][ T6810] RIP: 0033:0x7fa9b67bc0e9 [ 484.899003][ T6810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 07:25:52 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (fail_nth: 6) 07:25:52 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:52 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x60ff, 0x3, 0x0, 0x3) 07:25:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) [ 484.918790][ T6810] RSP: 002b:00007fa9b5f32168 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 484.927209][ T6810] RAX: ffffffffffffffda RBX: 00007fa9b68cef60 RCX: 00007fa9b67bc0e9 [ 484.935262][ T6810] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000006 [ 484.943240][ T6810] RBP: 00007fa9b5f321d0 R08: 0000000000000000 R09: 0000000000000000 [ 484.951212][ T6810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 484.959182][ T6810] R13: 00007ffce830222f R14: 00007fa9b5f32300 R15: 0000000000022000 [ 484.967173][ T6810] 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x2, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x10000000, 0x3, 0x0, 0x29) 07:25:52 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0xf0ff1f, 0x3, 0x0, 0x3) [ 484.999179][ T6832] FAULT_INJECTION: forcing a failure. [ 484.999179][ T6832] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 485.012536][ T6832] CPU: 0 PID: 6832 Comm: syz-executor.1 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 485.023565][ T6832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.033622][ T6832] Call Trace: [ 485.036908][ T6832] [ 485.039926][ T6832] dump_stack_lvl+0xd6/0x122 [ 485.044559][ T6832] dump_stack+0x11/0x12 07:25:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x1ffff000, 0x3, 0x0, 0x29) 07:25:52 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x1000000, 0x3, 0x0, 0x3) 07:25:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:52 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x10000000, 0x3, 0x0, 0x3) [ 485.048723][ T6832] should_fail+0x230/0x240 [ 485.053148][ T6832] __alloc_pages+0xf0/0x320 [ 485.057662][ T6832] alloc_pages_vma+0x66d/0x7e0 [ 485.062609][ T6832] ? __anon_vma_prepare+0x20b/0x2a0 [ 485.067819][ T6832] do_anonymous_page+0x15c/0xa10 [ 485.072759][ T6832] ? preempt_count_add+0x5e/0xa0 [ 485.077703][ T6832] ? _raw_spin_unlock+0x2d/0x50 [ 485.082578][ T6832] ? __pmd_alloc+0x2cb/0x300 [ 485.087247][ T6832] handle_mm_fault+0x83c/0xa40 [ 485.092034][ T6832] do_user_addr_fault+0x4cd/0x940 [ 485.097069][ T6832] exc_page_fault+0x60/0x160 [ 485.101664][ T6832] asm_exc_page_fault+0x1e/0x30 [ 485.106517][ T6832] RIP: 0010:copy_user_generic_unrolled+0x89/0xd0 [ 485.112870][ T6832] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 485.132481][ T6832] RSP: 0018:ffffc9000bfb7ea0 EFLAGS: 00050202 [ 485.138636][ T6832] RAX: ffff88811d2badf8 RBX: 00007fffffffeff0 RCX: 0000000000000002 [ 485.146626][ T6832] RDX: 0000000000000000 RSI: ffffc9000bfb7ed0 RDI: 0000000020000000 [ 485.154602][ T6832] RBP: 0000000000000000 R08: 00000000000001e4 R09: 0000000000000000 [ 485.162612][ T6832] R10: 0001c9000bfb7ed0 R11: 0001c9000bfb7edf R12: 0000000000000010 [ 485.170645][ T6832] R13: 0000000000000000 R14: 0000000020000000 R15: ffffc9000bfb7ed0 [ 485.178630][ T6832] _copy_to_user+0x72/0x90 [ 485.183066][ T6832] put_timespec64+0x51/0x90 [ 485.187590][ T6832] __x64_sys_clock_gettime+0x131/0x170 [ 485.193056][ T6832] do_syscall_64+0x2b/0x70 [ 485.197539][ T6832] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 485.203539][ T6832] RIP: 0033:0x7fa9b67bc0e9 [ 485.207957][ T6832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 485.227582][ T6832] RSP: 002b:00007fa9b5f32168 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4 [ 485.235997][ T6832] RAX: ffffffffffffffda RBX: 00007fa9b68cef60 RCX: 00007fa9b67bc0e9 07:25:52 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (fail_nth: 7) 07:25:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x20000000, 0x3, 0x0, 0x29) 07:25:52 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:52 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x1ffff000, 0x3, 0x0, 0x3) 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x1000000, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) [ 485.244016][ T6832] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000006 [ 485.251982][ T6832] RBP: 00007fa9b5f321d0 R08: 0000000000000000 R09: 0000000000000000 [ 485.259962][ T6832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 485.267921][ T6832] R13: 00007ffce830222f R14: 00007fa9b5f32300 R15: 0000000000022000 [ 485.276063][ T6832] 07:25:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x2000000, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0xa4ffffff, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0xffffffa4, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) [ 485.299775][ T6860] FAULT_INJECTION: forcing a failure. [ 485.299775][ T6860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 485.312866][ T6860] CPU: 0 PID: 6860 Comm: syz-executor.1 Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 [ 485.323806][ T6860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.333861][ T6860] Call Trace: [ 485.337137][ T6860] [ 485.340065][ T6860] dump_stack_lvl+0xd6/0x122 [ 485.344667][ T6860] dump_stack+0x11/0x12 07:25:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x21000000, 0x3, 0x0, 0x29) 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) [ 485.348827][ T6860] should_fail+0x230/0x240 [ 485.353251][ T6860] should_fail_usercopy+0x16/0x20 [ 485.358287][ T6860] _copy_to_user+0x1a/0x90 [ 485.362839][ T6860] simple_read_from_buffer+0xab/0x120 [ 485.368242][ T6860] proc_fail_nth_read+0x10d/0x150 [ 485.373377][ T6860] ? proc_fault_inject_write+0x230/0x230 [ 485.379020][ T6860] vfs_read+0x1a1/0x6a0 [ 485.383206][ T6860] ? __fget_files+0x1d2/0x210 [ 485.387890][ T6860] ksys_read+0xe8/0x1a0 [ 485.392092][ T6860] __x64_sys_read+0x3e/0x50 [ 485.396648][ T6860] do_syscall_64+0x2b/0x70 [ 485.401074][ T6860] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 485.406980][ T6860] RIP: 0033:0x7fa9b676ec9c [ 485.411418][ T6860] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 485.431031][ T6860] RSP: 002b:00007fa9b5f32160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 485.439450][ T6860] RAX: ffffffffffffffda RBX: 00007fa9b68cef60 RCX: 00007fa9b676ec9c 07:25:52 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) 07:25:52 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:52 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x20000000, 0x3, 0x0, 0x3) 07:25:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x29000000, 0x3, 0x0, 0x29) 07:25:52 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x21000000, 0x3, 0x0, 0x3) 07:25:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0xff600000, 0x3, 0x0, 0x29) 07:25:52 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:52 executing program 1: clock_gettime(0xa, &(0x7f0000000000)) 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x5, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) [ 485.447512][ T6860] RDX: 000000000000000f RSI: 00007fa9b5f321e0 RDI: 0000000000000003 [ 485.455467][ T6860] RBP: 00007fa9b5f321d0 R08: 0000000000000000 R09: 0000000000000000 [ 485.463420][ T6860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 485.471388][ T6860] R13: 00007ffce830222f R14: 00007fa9b5f32300 R15: 0000000000022000 [ 485.479345][ T6860] 07:25:52 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x29000000, 0x3, 0x0, 0x3) 07:25:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0xffffffff, 0x3, 0x0, 0x29) 07:25:52 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:52 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:52 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, 0x0, 0x29) 07:25:52 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x6, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 1: clock_gettime(0xb, &(0x7f0000000000)) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0xff600000, 0x3, 0x0, 0x3) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x29) 07:25:53 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000040)={0x8, 0xfffffffffffffff8, 0x1, 0x79, 0x3, 0x2, 0x0, 0xfff00000000000}, &(0x7f0000000080)={0x5, 0x8001, 0x8001, 0x7, 0x100000001, 0x8, 0x4, 0x4}, &(0x7f00000000c0)={0x5, 0x7, 0x7, 0x1, 0x9, 0x5, 0x9, 0x2}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x6]}, 0x8}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x1d, r0}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x5, 0x6, 0xad, {0x0, 0xea60}, {0x77359400}, {0x1, 0x0, 0x0, 0x1}, 0x1, @can={{0x2, 0x0, 0x1, 0x1}, 0x8, 0x0, 0x0, 0x0, "e806799f57c5a916"}}, 0x48}, 0x1, 0x0, 0x0, 0xa085}, 0x20000000) prctl$PR_GET_DUMPABLE(0x3) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x7, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0xffffffff, 0x3, 0x0, 0x3) 07:25:53 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) (async) pselect6(0x40, &(0x7f0000000040)={0x8, 0xfffffffffffffff8, 0x1, 0x79, 0x3, 0x2, 0x0, 0xfff00000000000}, &(0x7f0000000080)={0x5, 0x8001, 0x8001, 0x7, 0x100000001, 0x8, 0x4, 0x4}, &(0x7f00000000c0)={0x5, 0x7, 0x7, 0x1, 0x9, 0x5, 0x9, 0x2}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x6]}, 0x8}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x1d, r0}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x5, 0x6, 0xad, {0x0, 0xea60}, {0x77359400}, {0x1, 0x0, 0x0, 0x1}, 0x1, @can={{0x2, 0x0, 0x1, 0x1}, 0x8, 0x0, 0x0, 0x0, "e806799f57c5a916"}}, 0x48}, 0x1, 0x0, 0x0, 0xa085}, 0x20000000) prctl$PR_GET_DUMPABLE(0x3) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x5, 0x0, 0x29) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x8, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2, 0x0, 0x3) 07:25:53 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000040)={0x8, 0xfffffffffffffff8, 0x1, 0x79, 0x3, 0x2, 0x0, 0xfff00000000000}, &(0x7f0000000080)={0x5, 0x8001, 0x8001, 0x7, 0x100000001, 0x8, 0x4, 0x4}, &(0x7f00000000c0)={0x5, 0x7, 0x7, 0x1, 0x9, 0x5, 0x9, 0x2}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x6]}, 0x8}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', 0x0}) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x1d, r0}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x5, 0x6, 0xad, {0x0, 0xea60}, {0x77359400}, {0x1, 0x0, 0x0, 0x1}, 0x1, @can={{0x2, 0x0, 0x1, 0x1}, 0x8, 0x0, 0x0, 0x0, "e806799f57c5a916"}}, 0x48}, 0x1, 0x0, 0x0, 0xa085}, 0x20000000) prctl$PR_GET_DUMPABLE(0x3) clock_gettime(0x0, &(0x7f0000000000)) (async) pselect6(0x40, &(0x7f0000000040)={0x8, 0xfffffffffffffff8, 0x1, 0x79, 0x3, 0x2, 0x0, 0xfff00000000000}, &(0x7f0000000080)={0x5, 0x8001, 0x8001, 0x7, 0x100000001, 0x8, 0x4, 0x4}, &(0x7f00000000c0)={0x5, 0x7, 0x7, 0x1, 0x9, 0x5, 0x9, 0x2}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x6]}, 0x8}) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vxcan1\x00'}) (async) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x1d, r0}, 0x10, &(0x7f00000002c0)={&(0x7f0000000240)={0x5, 0x6, 0xad, {0x0, 0xea60}, {0x77359400}, {0x1, 0x0, 0x0, 0x1}, 0x1, @can={{0x2, 0x0, 0x1, 0x1}, 0x8, 0x0, 0x0, 0x0, "e806799f57c5a916"}}, 0x48}, 0x1, 0x0, 0x0, 0xa085}, 0x20000000) (async) prctl$PR_GET_DUMPABLE(0x3) (async) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, 0x0, 0x0) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xa, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x6, 0x0, 0x29) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, 0x0, 0x3) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1, 0x3f00}}, 0x128) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xb, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x108, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x200cc844) clock_gettime(0x6, &(0x7f0000000000)) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x7, 0x0, 0x29) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, 0x0, 0x0) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1, 0x3f000000}}, 0x128) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x5, 0x0, 0x3) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xc, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x8, 0x0, 0x29) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, 0x0, 0x0) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x6, 0x0, 0x3) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xd, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xa, 0x0, 0x29) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x8) 07:25:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x108, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x200cc844) (async) clock_gettime(0x6, &(0x7f0000000000)) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x7, 0x0, 0x3) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xf, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xb, 0x0, 0x29) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x7ffff000) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x8, 0x0, 0x3) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x10, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x7ffffffff000) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xc, 0x0, 0x29) 07:25:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x108, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x30}, 0x200cc844) clock_gettime(0x6, &(0x7f0000000000)) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x11, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xa, 0x0, 0x3) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0, {0x1e3f}}, './file0\x00'}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000840)={0xc, 0x8, 0xfa00, {&(0x7f00000006c0)}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000580)={0x16, 0x98, 0xfa00, {&(0x7f0000000540), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e22, 0x20, @private1, 0x9}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x5, @local, 0xad63}, @ib={0x1b, 0xfff, 0x9b, {"2b13fb3f84e371a8dab62884b5a96475"}, 0x401, 0x9, 0xeca0}}}, 0x118) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x4, 0x0, [0x26c, 0xc0, 0x1c05fb39, 0x81, 0x9, 0x1, 0x1000, 0x7, 0x8001, 0x1, 0x7, 0x2, 0xfffff7c2, 0x2, 0x0, 0x1000]}, {0x20, 0x0, [0x7fffffff, 0x7, 0x0, 0xdbe, 0xa50, 0x7fff, 0x57060319, 0x2, 0x7, 0x0, 0x3, 0x8, 0x4, 0x30c7, 0x0, 0xa774]}, {0x10, 0x0, [0x7, 0x8000, 0x8000, 0x5, 0x4e3a, 0x5, 0x80000001, 0x1f, 0x4, 0x5, 0x2, 0x9, 0x7fff, 0x3f, 0x8, 0x20]}, {0x18, 0x0, [0x3, 0x7, 0x80000000, 0x4, 0x200, 0xd2, 0xe0, 0x87f, 0xc9, 0x7, 0x6620, 0x7, 0x1, 0x0, 0xfff, 0xffff]}], r4, 0x1, 0x1, 0x120}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000640)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r5}}, 0x128) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xd, 0x0, 0x29) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x12, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xb, 0x0, 0x3) 07:25:53 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x58, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) pipe2$watch_queue(&(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000001180)=@bloom_filter={0x1e, 0x8, 0x80, 0x8, 0x200, 0x1, 0xfffffffa, '\x00', r0, r1, 0x3, 0x0, 0x1, 0xa}, 0x48) clock_gettime(0x3, &(0x7f0000000000)) r2 = msgget(0x3, 0x40) msgrcv(r2, &(0x7f0000000040)={0x0, ""/4096}, 0x1008, 0x3, 0x800) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xf, 0x0, 0x29) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x13, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x58, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) pipe2$watch_queue(&(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000001180)=@bloom_filter={0x1e, 0x8, 0x80, 0x8, 0x200, 0x1, 0xfffffffa, '\x00', r0, r1, 0x3, 0x0, 0x1, 0xa}, 0x48) clock_gettime(0x3, &(0x7f0000000000)) r2 = msgget(0x3, 0x40) msgrcv(r2, &(0x7f0000000040)={0x0, ""/4096}, 0x1008, 0x3, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x58, &(0x7f0000001080)}, 0x10) (async) pipe2$watch_queue(&(0x7f0000001140), 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001180)=@bloom_filter={0x1e, 0x8, 0x80, 0x8, 0x200, 0x1, 0xfffffffa, '\x00', r0, r1, 0x3, 0x0, 0x1, 0xa}, 0x48) (async) clock_gettime(0x3, &(0x7f0000000000)) (async) msgget(0x3, 0x40) (async) msgrcv(r2, &(0x7f0000000040)={0x0, ""/4096}, 0x1008, 0x3, 0x800) (async) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0, {0x1e3f}}, './file0\x00'}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000840)={0xc, 0x8, 0xfa00, {&(0x7f00000006c0)}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000580)={0x16, 0x98, 0xfa00, {&(0x7f0000000540), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e22, 0x20, @private1, 0x9}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x5, @local, 0xad63}, @ib={0x1b, 0xfff, 0x9b, {"2b13fb3f84e371a8dab62884b5a96475"}, 0x401, 0x9, 0xeca0}}}, 0x118) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x4, 0x0, [0x26c, 0xc0, 0x1c05fb39, 0x81, 0x9, 0x1, 0x1000, 0x7, 0x8001, 0x1, 0x7, 0x2, 0xfffff7c2, 0x2, 0x0, 0x1000]}, {0x20, 0x0, [0x7fffffff, 0x7, 0x0, 0xdbe, 0xa50, 0x7fff, 0x57060319, 0x2, 0x7, 0x0, 0x3, 0x8, 0x4, 0x30c7, 0x0, 0xa774]}, {0x10, 0x0, [0x7, 0x8000, 0x8000, 0x5, 0x4e3a, 0x5, 0x80000001, 0x1f, 0x4, 0x5, 0x2, 0x9, 0x7fff, 0x3f, 0x8, 0x20]}, {0x18, 0x0, [0x3, 0x7, 0x80000000, 0x4, 0x200, 0xd2, 0xe0, 0x87f, 0xc9, 0x7, 0x6620, 0x7, 0x1, 0x0, 0xfff, 0xffff]}], r4, 0x1, 0x1, 0x120}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000640)={0xf, 0x8, 0xfa00, {r4}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r5}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0, {0x1e3f}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000840)={0xc, 0x8, 0xfa00, {&(0x7f00000006c0)}}, 0x10) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000580)={0x16, 0x98, 0xfa00, {&(0x7f0000000540), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e22, 0x20, @private1, 0x9}}}, 0xa0) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x5, @local, 0xad63}, @ib={0x1b, 0xfff, 0x9b, {"2b13fb3f84e371a8dab62884b5a96475"}, 0x401, 0x9, 0xeca0}}}, 0x118) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340), 0x111, 0x8}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x4, 0x0, [0x26c, 0xc0, 0x1c05fb39, 0x81, 0x9, 0x1, 0x1000, 0x7, 0x8001, 0x1, 0x7, 0x2, 0xfffff7c2, 0x2, 0x0, 0x1000]}, {0x20, 0x0, [0x7fffffff, 0x7, 0x0, 0xdbe, 0xa50, 0x7fff, 0x57060319, 0x2, 0x7, 0x0, 0x3, 0x8, 0x4, 0x30c7, 0x0, 0xa774]}, {0x10, 0x0, [0x7, 0x8000, 0x8000, 0x5, 0x4e3a, 0x5, 0x80000001, 0x1f, 0x4, 0x5, 0x2, 0x9, 0x7fff, 0x3f, 0x8, 0x20]}, {0x18, 0x0, [0x3, 0x7, 0x80000000, 0x4, 0x200, 0xd2, 0xe0, 0x87f, 0xc9, 0x7, 0x6620, 0x7, 0x1, 0x0, 0xfff, 0xffff]}], r4, 0x1, 0x1, 0x120}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000640)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r5}}, 0x128) (async) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xc, 0x0, 0x3) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x14, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x58, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) pipe2$watch_queue(&(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000001180)=@bloom_filter={0x1e, 0x8, 0x80, 0x8, 0x200, 0x1, 0xfffffffa, '\x00', r0, r1, 0x3, 0x0, 0x1, 0xa}, 0x48) clock_gettime(0x3, &(0x7f0000000000)) (async, rerun: 32) r2 = msgget(0x3, 0x40) (rerun: 32) msgrcv(r2, &(0x7f0000000040)={0x0, ""/4096}, 0x1008, 0x3, 0x800) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000680)={{0x1, 0x1, 0x18, r0, {0x1e3f}}, './file0\x00'}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000840)={0xc, 0x8, 0xfa00, {&(0x7f00000006c0)}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000580)={0x16, 0x98, 0xfa00, {&(0x7f0000000540), 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e22, 0x20, @private1, 0x9}}}, 0xa0) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x5, @local, 0xad63}, @ib={0x1b, 0xfff, 0x9b, {"2b13fb3f84e371a8dab62884b5a96475"}, 0x401, 0x9, 0xeca0}}}, 0x118) (async, rerun: 64) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x4, 0x0, [0x26c, 0xc0, 0x1c05fb39, 0x81, 0x9, 0x1, 0x1000, 0x7, 0x8001, 0x1, 0x7, 0x2, 0xfffff7c2, 0x2, 0x0, 0x1000]}, {0x20, 0x0, [0x7fffffff, 0x7, 0x0, 0xdbe, 0xa50, 0x7fff, 0x57060319, 0x2, 0x7, 0x0, 0x3, 0x8, 0x4, 0x30c7, 0x0, 0xa774]}, {0x10, 0x0, [0x7, 0x8000, 0x8000, 0x5, 0x4e3a, 0x5, 0x80000001, 0x1f, 0x4, 0x5, 0x2, 0x9, 0x7fff, 0x3f, 0x8, 0x20]}, {0x18, 0x0, [0x3, 0x7, 0x80000000, 0x4, 0x200, 0xd2, 0xe0, 0x87f, 0xc9, 0x7, 0x6620, 0x7, 0x1, 0x0, 0xfff, 0xffff]}], r4, 0x1, 0x1, 0x120}}, 0x20) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000640)={0xf, 0x8, 0xfa00, {r4}}, 0x10) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r5}}, 0x128) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x12, 0x0, 0x29) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xd, 0x0, 0x3) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x13, 0x0, 0x29) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x15, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 1: msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000000)=""/3) r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/12) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0xf, 0x0, 0x3) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x14, 0x0, 0x29) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x16, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 1: msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000000)=""/3) (async, rerun: 32) r0 = msgget$private(0x0, 0x0) (rerun: 32) msgctl$IPC_RMID(r0, 0x0) (async) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/12) 07:25:53 executing program 1: msgctl$MSG_STAT_ANY(0xffffffffffffffff, 0xd, &(0x7f0000000000)=""/3) (async, rerun: 32) r0 = msgget$private(0x0, 0x0) (rerun: 32) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/12) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x17, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x12, 0x0, 0x3) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x18, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) (async) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:53 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x6, &(0x7f0000000040)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="ff0f0000000000002eaf66696c653000"]) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r0, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r2}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c4000000000000425bd7000fddbdf250278c4fd5eeca58fefd7f0ea044befa14aaf24db15db6bb9efba95b00039e2eda40d5964b5e833b80dfc384534fe1f5a9a9836886f8c65e37977a90148e8a712f26b214682f3d1760f7d4a4fdeb097071184f3f9a8ff8d84ea1ae63c954b933f51b689b47811f4d45c1b1a", @ANYRES32=r2, @ANYBLOB="1400030067726574617030000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x3ff, 0xfffffffa, 0x1, 0x80, 0x1, 0x1, '\x00', r2, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xd}, 0x48) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x15, 0x0, 0x29) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x13, 0x0, 0x3) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x16, 0x0, 0x29) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x19, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x6, &(0x7f0000000040)) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async, rerun: 64) r1 = socket$inet_udp(0x2, 0x2, 0x0) (rerun: 64) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="ff0f0000000000002eaf66696c653000"]) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r0, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 32) sendmsg$nl_route(r0, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r2}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c4000000000000425bd7000fddbdf250278c4fd5eeca58fefd7f0ea044befa14aaf24db15db6bb9efba95b00039e2eda40d5964b5e833b80dfc384534fe1f5a9a9836886f8c65e37977a90148e8a712f26b214682f3d1760f7d4a4fdeb097071184f3f9a8ff8d84ea1ae63c954b933f51b689b47811f4d45c1b1a", @ANYRES32=r2, @ANYBLOB="1400030067726574617030000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x3ff, 0xfffffffa, 0x1, 0x80, 0x1, 0x1, '\x00', r2, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xd}, 0x48) 07:25:53 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x14, 0x0, 0x3) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x1a, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) connect$caif(r0, &(0x7f0000000200), 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[@ANYRESDEC=r3, @ANYRES32=0x0, @ANYRESDEC, @ANYRES64=r0], 0x18}}, 0x4004084) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000010000001800000059b812b0a063ff406c63c5f03b98ac5a241392004541d9067576d7970000000000000000000000ece474726708a3d54f959f288697cd6ce1d35ad23f08a5c23687a2434d3556be7e629b09429c9f36f4572098fdc5bede784f285da0381d48ba9ba58fb1e6cd69e3a2576d934c200a5ba54ece3e34d762df9c7f411634c02bc5884d688c2e54b5f2caf5d522f4d899faf440510b34ce52683ec2af0ba7992745", @ANYRES32=r4, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x7f, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="f40000001800010025bd7000fcdbdf250a008006fe02fd0b00000000050014000300000005001400d40000000c0009000500000924f0ddbf966e0903a3fd0c437bcc15ebbf530922be0165167d18a3563935e610e5505a067736c89e15dc4af431d61e7b56b021322350f32b6a1b246621e0bf613afbb3d09406bdedce8dada426c50f11fcbac67954575e677bbb6c8cdb7747833b2fc0617c0d51c48dfa0b2cf7d45d6e370374fa88f2d862b416acf7cf3fe88723f2f9ca2cd04431fd063b2afb9b3b2684bcea27c958", @ANYRES32=r6, @ANYBLOB="1200088067ab4dd94183642d1dbd27e368ad000014000500000000ffff0a01010285000880d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac76f11c5690a83daf80777f2a92dafce30000000c000900faff0207", @ANYRES32=0x0, @ANYBLOB], 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r8}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r8, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r8, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @private=0xa010101}, @in={0x2, 0x4e20, @private=0xa010101}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x17, 0x0, 0x29) 07:25:53 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) connect$caif(r0, &(0x7f0000000200), 0x18) (async) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[@ANYRESDEC=r3, @ANYRES32=0x0, @ANYRESDEC, @ANYRES64=r0], 0x18}}, 0x4004084) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000010000001800000059b812b0a063ff406c63c5f03b98ac5a241392004541d9067576d7970000000000000000000000ece474726708a3d54f959f288697cd6ce1d35ad23f08a5c23687a2434d3556be7e629b09429c9f36f4572098fdc5bede784f285da0381d48ba9ba58fb1e6cd69e3a2576d934c200a5ba54ece3e34d762df9c7f411634c02bc5884d688c2e54b5f2caf5d522f4d899faf440510b34ce52683ec2af0ba7992745", @ANYRES32=r4, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x7f, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="f40000001800010025bd7000fcdbdf250a008006fe02fd0b00000000050014000300000005001400d40000000c0009000500000924f0ddbf966e0903a3fd0c437bcc15ebbf530922be0165167d18a3563935e610e5505a067736c89e15dc4af431d61e7b56b021322350f32b6a1b246621e0bf613afbb3d09406bdedce8dada426c50f11fcbac67954575e677bbb6c8cdb7747833b2fc0617c0d51c48dfa0b2cf7d45d6e370374fa88f2d862b416acf7cf3fe88723f2f9ca2cd04431fd063b2afb9b3b2684bcea27c958", @ANYRES32=r6, @ANYBLOB="1200088067ab4dd94183642d1dbd27e368ad000014000500000000ffff0a01010285000880d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac76f11c5690a83daf80777f2a92dafce30000000c000900faff0207", @ANYRES32=0x0, @ANYBLOB], 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r8}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r8, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r8, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @private=0xa010101}, @in={0x2, 0x4e20, @private=0xa010101}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x15, 0x0, 0x3) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x16, 0x0, 0x3) 07:25:53 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (async) clock_gettime(0x6, &(0x7f0000000040)) (async, rerun: 64) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async, rerun: 64) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="ff0f0000000000002eaf66696c653000"]) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r0, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r2}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c4000000000000425bd7000fddbdf250278c4fd5eeca58fefd7f0ea044befa14aaf24db15db6bb9efba95b00039e2eda40d5964b5e833b80dfc384534fe1f5a9a9836886f8c65e37977a90148e8a712f26b214682f3d1760f7d4a4fdeb097071184f3f9a8ff8d84ea1ae63c954b933f51b689b47811f4d45c1b1a", @ANYRES32=r2, @ANYBLOB="1400030067726574617030000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x3ff, 0xfffffffa, 0x1, 0x80, 0x1, 0x1, '\x00', r2, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xd}, 0x48) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x18, 0x0, 0x29) 07:25:53 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) connect$caif(r0, &(0x7f0000000200), 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[@ANYRESDEC=r3, @ANYRES32=0x0, @ANYRESDEC, @ANYRES64=r0], 0x18}}, 0x4004084) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000010000001800000059b812b0a063ff406c63c5f03b98ac5a241392004541d9067576d7970000000000000000000000ece474726708a3d54f959f288697cd6ce1d35ad23f08a5c23687a2434d3556be7e629b09429c9f36f4572098fdc5bede784f285da0381d48ba9ba58fb1e6cd69e3a2576d934c200a5ba54ece3e34d762df9c7f411634c02bc5884d688c2e54b5f2caf5d522f4d899faf440510b34ce52683ec2af0ba7992745", @ANYRES32=r4, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x7f, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="f40000001800010025bd7000fcdbdf250a008006fe02fd0b00000000050014000300000005001400d40000000c0009000500000924f0ddbf966e0903a3fd0c437bcc15ebbf530922be0165167d18a3563935e610e5505a067736c89e15dc4af431d61e7b56b021322350f32b6a1b246621e0bf613afbb3d09406bdedce8dada426c50f11fcbac67954575e677bbb6c8cdb7747833b2fc0617c0d51c48dfa0b2cf7d45d6e370374fa88f2d862b416acf7cf3fe88723f2f9ca2cd04431fd063b2afb9b3b2684bcea27c958", @ANYRES32=r6, @ANYBLOB="1200088067ab4dd94183642d1dbd27e368ad000014000500000000ffff0a01010285000880d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac76f11c5690a83daf80777f2a92dafce30000000c000900faff0207", @ANYRES32=0x0, @ANYBLOB], 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r8}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r8, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r8, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @private=0xa010101}, @in={0x2, 0x4e20, @private=0xa010101}}}, 0x118) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r2}}, 0x128) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) connect$caif(r0, &(0x7f0000000200), 0x18) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=ANY=[@ANYRESDEC=r3, @ANYRES32=0x0, @ANYRESDEC, @ANYRES64=r0], 0x18}}, 0x4004084) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000010000001800000059b812b0a063ff406c63c5f03b98ac5a241392004541d9067576d7970000000000000000000000ece474726708a3d54f959f288697cd6ce1d35ad23f08a5c23687a2434d3556be7e629b09429c9f36f4572098fdc5bede784f285da0381d48ba9ba58fb1e6cd69e3a2576d934c200a5ba54ece3e34d762df9c7f411634c02bc5884d688c2e54b5f2caf5d522f4d899faf440510b34ce52683ec2af0ba7992745", @ANYRES32=r4, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) (async) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x7f, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)}, 0x10) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="f40000001800010025bd7000fcdbdf250a008006fe02fd0b00000000050014000300000005001400d40000000c0009000500000924f0ddbf966e0903a3fd0c437bcc15ebbf530922be0165167d18a3563935e610e5505a067736c89e15dc4af431d61e7b56b021322350f32b6a1b246621e0bf613afbb3d09406bdedce8dada426c50f11fcbac67954575e677bbb6c8cdb7747833b2fc0617c0d51c48dfa0b2cf7d45d6e370374fa88f2d862b416acf7cf3fe88723f2f9ca2cd04431fd063b2afb9b3b2684bcea27c958", @ANYRES32=r6, @ANYBLOB="1200088067ab4dd94183642d1dbd27e368ad000014000500000000ffff0a01010285000880d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac76f11c5690a83daf80777f2a92dafce30000000c000900faff0207", @ANYRES32=0x0, @ANYBLOB], 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r8}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r8, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r8, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @private=0xa010101}, @in={0x2, 0x4e20, @private=0xa010101}}}, 0x118) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r2}}, 0x128) (async) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x22, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x17, 0x0, 0x3) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x19, 0x0, 0x29) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x24, r0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x23, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 1: clock_gettime(0x6, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x7fff, 0x2, 0x4, 0x8000000000000000, 0xded, 0x3, 0x442, 0xfff}, &(0x7f0000000080)={0xe9e, 0x100000000, 0xb97, 0x3f, 0x6, 0x1, 0x80, 0x9}, &(0x7f00000000c0)={0x9, 0x7, 0x8000, 0x7, 0x9, 0x44, 0x5, 0x81}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x2]}, 0x8}) pselect6(0x40, &(0x7f00000001c0)={0x1f, 0x7, 0xfffffffffffffffc, 0xc1b2, 0x6, 0x6, 0x0, 0x5}, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x6, 0x7, 0x1, 0xc4, 0x9}, &(0x7f0000000240)={0x3, 0x9, 0x0, 0x7fffffffffffffff, 0x7, 0x9, 0x1}, &(0x7f0000000280)={0x0, 0x3938700}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x6]}, 0x8}) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x18, 0x0, 0x3) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x1c}}, 0x0) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x1a, 0x0, 0x29) 07:25:53 executing program 1: clock_gettime(0x6, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x7fff, 0x2, 0x4, 0x8000000000000000, 0xded, 0x3, 0x442, 0xfff}, &(0x7f0000000080)={0xe9e, 0x100000000, 0xb97, 0x3f, 0x6, 0x1, 0x80, 0x9}, &(0x7f00000000c0)={0x9, 0x7, 0x8000, 0x7, 0x9, 0x44, 0x5, 0x81}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x2]}, 0x8}) pselect6(0x40, &(0x7f00000001c0)={0x1f, 0x7, 0xfffffffffffffffc, 0xc1b2, 0x6, 0x6, 0x0, 0x5}, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x6, 0x7, 0x1, 0xc4, 0x9}, &(0x7f0000000240)={0x3, 0x9, 0x0, 0x7fffffffffffffff, 0x7, 0x9, 0x1}, &(0x7f0000000280)={0x0, 0x3938700}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x6]}, 0x8}) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) (async) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x24, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, r0, 0x1}, 0x14}}, 0x0) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x19, 0x0, 0x3) 07:25:53 executing program 1: clock_gettime(0x6, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000000)={0x7fff, 0x2, 0x4, 0x8000000000000000, 0xded, 0x3, 0x442, 0xfff}, &(0x7f0000000080)={0xe9e, 0x100000000, 0xb97, 0x3f, 0x6, 0x1, 0x80, 0x9}, &(0x7f00000000c0)={0x9, 0x7, 0x8000, 0x7, 0x9, 0x44, 0x5, 0x81}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x2]}, 0x8}) pselect6(0x40, &(0x7f00000001c0)={0x1f, 0x7, 0xfffffffffffffffc, 0xc1b2, 0x6, 0x6, 0x0, 0x5}, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x6, 0x7, 0x1, 0xc4, 0x9}, &(0x7f0000000240)={0x3, 0x9, 0x0, 0x7fffffffffffffff, 0x7, 0x9, 0x1}, &(0x7f0000000280)={0x0, 0x3938700}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x6]}, 0x8}) clock_gettime(0x6, &(0x7f0000000040)) (async) pselect6(0x40, &(0x7f0000000000)={0x7fff, 0x2, 0x4, 0x8000000000000000, 0xded, 0x3, 0x442, 0xfff}, &(0x7f0000000080)={0xe9e, 0x100000000, 0xb97, 0x3f, 0x6, 0x1, 0x80, 0x9}, &(0x7f00000000c0)={0x9, 0x7, 0x8000, 0x7, 0x9, 0x44, 0x5, 0x81}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x2]}, 0x8}) (async) pselect6(0x40, &(0x7f00000001c0)={0x1f, 0x7, 0xfffffffffffffffc, 0xc1b2, 0x6, 0x6, 0x0, 0x5}, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x6, 0x7, 0x1, 0xc4, 0x9}, &(0x7f0000000240)={0x3, 0x9, 0x0, 0x7fffffffffffffff, 0x7, 0x9, 0x1}, &(0x7f0000000280)={0x0, 0x3938700}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x6]}, 0x8}) (async) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, 0x0, 0x29) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r1, 0x7}}, 0x10) (rerun: 64) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x25, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x1a, 0x0, 0x3) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, r0, 0x1}, 0x14}}, 0x0) 07:25:53 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0xffffffffffff333e, 0x1, 0xfffffffffffffffd, 0x80, 0x5c0, 0x4, 0x3, 0x27ff}, &(0x7f0000000080)={0x4, 0x7, 0x5, 0x7, 0xfffffffffffff50c, 0x8, 0x2c4b, 0xaf7}, &(0x7f00000000c0)={0x3, 0x80000000000, 0x6, 0x85, 0x3f, 0x6, 0x7, 0x80}, &(0x7f0000000140)={r0, r1+10000000}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x99]}, 0x8}) r2 = msgget(0x0, 0x442) msgrcv(r2, &(0x7f0000000200)={0x0, ""/108}, 0x74, 0x1, 0x800) clock_getres(0x4, &(0x7f0000000280)) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x26, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x22, 0x0, 0x29) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1001002, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, 0x0, 0x3) 07:25:53 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0xffffffffffff333e, 0x1, 0xfffffffffffffffd, 0x80, 0x5c0, 0x4, 0x3, 0x27ff}, &(0x7f0000000080)={0x4, 0x7, 0x5, 0x7, 0xfffffffffffff50c, 0x8, 0x2c4b, 0xaf7}, &(0x7f00000000c0)={0x3, 0x80000000000, 0x6, 0x85, 0x3f, 0x6, 0x7, 0x80}, &(0x7f0000000140)={r0, r1+10000000}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x99]}, 0x8}) r2 = msgget(0x0, 0x442) msgrcv(r2, &(0x7f0000000200)={0x0, ""/108}, 0x74, 0x1, 0x800) clock_getres(0x4, &(0x7f0000000280)) clock_gettime(0x6, &(0x7f0000000000)) (async) clock_gettime(0x0, &(0x7f0000000100)) (async) pselect6(0x40, &(0x7f0000000040)={0xffffffffffff333e, 0x1, 0xfffffffffffffffd, 0x80, 0x5c0, 0x4, 0x3, 0x27ff}, &(0x7f0000000080)={0x4, 0x7, 0x5, 0x7, 0xfffffffffffff50c, 0x8, 0x2c4b, 0xaf7}, &(0x7f00000000c0)={0x3, 0x80000000000, 0x6, 0x85, 0x3f, 0x6, 0x7, 0x80}, &(0x7f0000000140)={r0, r1+10000000}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x99]}, 0x8}) (async) msgget(0x0, 0x442) (async) msgrcv(r2, &(0x7f0000000200)={0x0, ""/108}, 0x74, 0x1, 0x800) (async) clock_getres(0x4, &(0x7f0000000280)) (async) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1001002, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1001002, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, r0, 0x1}, 0x14}}, 0x0) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x27, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x22, 0x0, 0x3) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x31, 0x0, 0x29) 07:25:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1001002, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x28, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x31, 0x0, 0x3) 07:25:53 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040)={0xffffffffffff333e, 0x1, 0xfffffffffffffffd, 0x80, 0x5c0, 0x4, 0x3, 0x27ff}, &(0x7f0000000080)={0x4, 0x7, 0x5, 0x7, 0xfffffffffffff50c, 0x8, 0x2c4b, 0xaf7}, &(0x7f00000000c0)={0x3, 0x80000000000, 0x6, 0x85, 0x3f, 0x6, 0x7, 0x80}, &(0x7f0000000140)={r0, r1+10000000}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x99]}, 0x8}) r2 = msgget(0x0, 0x442) msgrcv(r2, &(0x7f0000000200)={0x0, ""/108}, 0x74, 0x1, 0x800) clock_getres(0x4, &(0x7f0000000280)) clock_gettime(0x6, &(0x7f0000000000)) (async) clock_gettime(0x0, &(0x7f0000000100)) (async) pselect6(0x40, &(0x7f0000000040)={0xffffffffffff333e, 0x1, 0xfffffffffffffffd, 0x80, 0x5c0, 0x4, 0x3, 0x27ff}, &(0x7f0000000080)={0x4, 0x7, 0x5, 0x7, 0xfffffffffffff50c, 0x8, 0x2c4b, 0xaf7}, &(0x7f00000000c0)={0x3, 0x80000000000, 0x6, 0x85, 0x3f, 0x6, 0x7, 0x80}, &(0x7f0000000140)={r0, r1+10000000}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x99]}, 0x8}) (async) msgget(0x0, 0x442) (async) msgrcv(r2, &(0x7f0000000200)={0x0, ""/108}, 0x74, 0x1, 0x800) (async) clock_getres(0x4, &(0x7f0000000280)) (async) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}}, 0x0) 07:25:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000005c0), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0x54, r2, 0x601, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x2e, 0x7, 'system_u:object_r:netlabel_mgmt_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x54}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8919, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, r2, 0x2, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv_slave_0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:dhcpc_state_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_vlan\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x20044880}, 0x800) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) r7 = syz_open_dev$vcsa(&(0x7f0000000480), 0x2, 0x3c1900) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r10 = socket(0x28, 0xa, 0x2) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000740)={0x70, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'wpan4\x00'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '%'}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x40000) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x1}, r4}}, 0x128) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}}, 0x0) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x29, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x32, 0x0, 0x29) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x32, 0x0, 0x3) 07:25:53 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000080), 0x2, 0x484082) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = socket(0x10, 0x5, 0x101) syz_genetlink_get_family_id$team(&(0x7f00000000c0), r2) clock_gettime(0x6, &(0x7f0000000000)) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2a, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:53 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x36, 0x0, 0x3) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x36, 0x0, 0x29) 07:25:53 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}}, 0x0) 07:25:53 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:53 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2b, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000005c0), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0x54, r2, 0x601, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x2e, 0x7, 'system_u:object_r:netlabel_mgmt_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x54}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8919, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, r2, 0x2, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv_slave_0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:dhcpc_state_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_vlan\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x20044880}, 0x800) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) r7 = syz_open_dev$vcsa(&(0x7f0000000480), 0x2, 0x3c1900) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r10 = socket(0x28, 0xa, 0x2) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000740)={0x70, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'wpan4\x00'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '%'}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x40000) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x1}, r4}}, 0x128) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000005c0), r1) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0x54, r2, 0x601, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x2e, 0x7, 'system_u:object_r:netlabel_mgmt_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x54}}, 0x0) (async) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8919, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, r2, 0x2, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv_slave_0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:dhcpc_state_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_vlan\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x20044880}, 0x800) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) syz_open_dev$vcsa(&(0x7f0000000480), 0x2, 0x3c1900) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) (async) socket(0x28, 0xa, 0x2) (async) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000740)={0x70, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'wpan4\x00'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '%'}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x40000) (async) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x2) 07:25:54 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async, rerun: 64) syz_open_dev$vcsa(&(0x7f0000000080), 0x2, 0x484082) (async, rerun: 64) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = socket(0x10, 0x5, 0x101) syz_genetlink_get_family_id$team(&(0x7f00000000c0), r2) clock_gettime(0x6, &(0x7f0000000000)) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) copy_file_range(r0, &(0x7f0000000000)=0x7, r0, 0x0, 0x4, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xffffffffffffff51) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2c, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x4) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) copy_file_range(r0, &(0x7f0000000000)=0x7, r0, 0x0, 0x4, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xffffffffffffff51) socket$l2tp(0x2, 0x2, 0x73) (async) copy_file_range(r0, &(0x7f0000000000)=0x7, r0, 0x0, 0x4, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xffffffffffffff51) (async) 07:25:54 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000080), 0x2, 0x484082) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async, rerun: 64) r2 = socket(0x10, 0x5, 0x101) (rerun: 64) syz_genetlink_get_family_id$team(&(0x7f00000000c0), r2) (async) clock_gettime(0x6, &(0x7f0000000000)) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2d, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000005c0), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0x54, r2, 0x601, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x2e, 0x7, 'system_u:object_r:netlabel_mgmt_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x54}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8919, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, r2, 0x2, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv_slave_0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:dhcpc_state_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_vlan\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x20044880}, 0x800) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) r7 = syz_open_dev$vcsa(&(0x7f0000000480), 0x2, 0x3c1900) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) r10 = socket(0x28, 0xa, 0x2) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000740)={0x70, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'wpan4\x00'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '%'}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x40000) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x1}, r4}}, 0x128) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000005c0), r1) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000700)={&(0x7f0000000580), 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0x54, r2, 0x601, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_SECCTX={0x2e, 0x7, 'system_u:object_r:netlabel_mgmt_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x54}}, 0x0) (async) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000000) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8919, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, r2, 0x2, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'batadv_slave_0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:dhcpc_state_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_vlan\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x20044880}, 0x800) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) syz_open_dev$vcsa(&(0x7f0000000480), 0x2, 0x3c1900) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) (async) socket(0x28, 0xa, 0x2) (async) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000740)={0x70, 0x0, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'wpan4\x00'}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8000000000000000}, @NBD_ATTR_BACKEND_IDENTIFIER={0x5, 0xa, '%'}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x84}, 0x40000) (async) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x1}, r4}}, 0x128) (async) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x5) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) copy_file_range(r0, &(0x7f0000000000)=0x7, r0, 0x0, 0x4, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xffffffffffffff51) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2e, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x1, &(0x7f0000000080)) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000040)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x12d8) 07:25:54 executing program 2: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x21, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x2f, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 2: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x21, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 3: socket$l2tp(0x2, 0x2, 0x73) 07:25:54 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x1, &(0x7f0000000080)) (async) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000040)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x12d8) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x30, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 2: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x21, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x6) 07:25:54 executing program 3: socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) (async) 07:25:54 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (async, rerun: 32) clock_gettime(0x1, &(0x7f0000000080)) (async, rerun: 32) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000040)) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x12d8) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x31, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 2: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x21, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r8}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r8, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000300), r8, 0x6}}, 0x18) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x32, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x7) 07:25:54 executing program 3: socket$l2tp(0x2, 0x2, 0x73) 07:25:54 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0xa8, r0, 0x400, 0x870bd24, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x6, 0x5, @multicast1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_vlan\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:chkpwd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4090}, 0x2) clock_gettime(0x6, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) clock_getres(0x4, &(0x7f0000000500)) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x30, 0x0, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wpan1\x00', 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x30, r1, 0x602, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_PID={0x8, 0x1c, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000800}, 0x4000) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="9a000000", @ANYRES16=r5, @ANYBLOB="080028bd7000fbdbdf250100000008000400ffffffff08000200030000000f00010076657468305f766c616e000014000500fe8000000000000000000000000000420a0001007770616e340000000800040003000000"], 0x5c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x40080) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100029bd7000fddbdf25100000000c000600020000000000000008000300", @ANYRES32=r3, @ANYBLOB="7ae292b8a18d2d2f9d6c500500000000000000da512ecb2650"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4040010) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000002, 'wlan0\x00'}, 0x18) 07:25:54 executing program 2: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x21, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0xa8, r0, 0x400, 0x870bd24, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x6, 0x5, @multicast1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_vlan\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:chkpwd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4090}, 0x2) (async) clock_gettime(0x6, &(0x7f0000000000)) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) clock_getres(0x4, &(0x7f0000000500)) (async) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x30, 0x0, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wpan1\x00', 0x0}) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x30, r1, 0x602, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_PID={0x8, 0x1c, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000800}, 0x4000) (async) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="9a000000", @ANYRES16=r5, @ANYBLOB="080028bd7000fbdbdf250100000008000400ffffffff08000200030000000f00010076657468305f766c616e000014000500fe8000000000000000000000000000420a0001007770616e340000000800040003000000"], 0x5c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x40080) (async) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100029bd7000fddbdf25100000000c000600020000000000000008000300", @ANYRES32=r3, @ANYBLOB="7ae292b8a18d2d2f9d6c500500000000000000da512ecb2650"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4040010) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x8) 07:25:54 executing program 2: socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x21, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r2}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r8}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r8, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000300), r8, 0x6}}, 0x18) 07:25:54 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$inet(0x2, 0x6, 0x5) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) 07:25:54 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0xa8, r0, 0x400, 0x870bd24, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x6, 0x5, @multicast1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_vlan\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:chkpwd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4090}, 0x2) (async) clock_gettime(0x6, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) clock_getres(0x4, &(0x7f0000000500)) (async) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000a00), 0xffffffffffffffff) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x30, 0x0, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x0) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'wpan1\x00', 0x0}) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x30, r1, 0x602, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_PID={0x8, 0x1c, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000800}, 0x4000) (async) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="9a000000", @ANYRES16=r5, @ANYBLOB="080028bd7000fbdbdf250100000008000400ffffffff08000200030000000f00010076657468305f766c616e000014000500fe8000000000000000000000000000420a0001007770616e340000000800040003000000"], 0x5c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x40080) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100029bd7000fddbdf25100000000c000600020000000000000008000300", @ANYRES32=r3, @ANYBLOB="7ae292b8a18d2d2f9d6c500500000000000000da512ecb2650"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4040010) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r8}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r8, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000300), r8, 0x6}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106}}, 0x20) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r2}}, 0x18) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200), 0x111, 0x5}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r4, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r3, 0x58, &(0x7f0000000640)}, 0x10) (async) sendmsg$nl_route(r3, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r8}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r8, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000003c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000300), r8, 0x6}}, 0x18) (async) 07:25:54 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, 0x0, 0x0) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xa) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xb) 07:25:54 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8000}}, 0x10) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00', 0x2}, 0x18) 07:25:54 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$inet(0x2, 0x6, 0x5) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) 07:25:54 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, 0x0, 0x0) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x1}}, 0x10) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00', 0x1000000}, 0x18) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xc) 07:25:54 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8000}}, 0x10) clock_gettime(0x6, &(0x7f0000000000)) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8000}}, 0x10) (async) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00', 0x2000000}, 0x18) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x1}}, 0x10) 07:25:54 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, 0x0, 0x0) 07:25:54 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0x8000}}, 0x10) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xd) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00', 0xa4ffffff}, 0x18) 07:25:54 executing program 3: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = socket$inet(0x2, 0x6, 0x5) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) 07:25:54 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xf) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000240)={0x4, 0x8, 0xfa00, {r1, 0x1}}, 0x10) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00', 0xffffffa4}, 0x18) 07:25:54 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) 07:25:54 executing program 1: clock_gettime(0x5, &(0x7f0000000500)) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0xffffffffffffff65) pselect6(0x40, &(0x7f0000000380)={0x49259859, 0x6, 0x4, 0x5, 0x7f, 0x4, 0x4, 0x2}, &(0x7f00000003c0)={0x8e72, 0x5, 0x0, 0x5, 0xf0f5, 0x3, 0x7}, &(0x7f0000000400)={0x5, 0x101, 0x0, 0x0, 0x7cec, 0xfff, 0x3, 0x7}, &(0x7f0000000440)={0x77359400}, &(0x7f00000004c0)={&(0x7f0000000480)={[0xe18b]}, 0x8}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xa0280, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x80}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r3}}, 0xc) r4 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r4, 0x0) r5 = msgget(0x0, 0xc) msgctl$IPC_STAT(r5, 0x2, &(0x7f0000000100)=""/184) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)={0x52, 0x400, 0xe9, {0x6, 0x782}, {0x8, 0x7}, @const={0xffff, {0x400, 0x5, 0xfffa, 0x8001}}}) 07:25:54 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x21, &(0x7f0000000280)={0x0, 'wlan0\x00'}, 0x18) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x12) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400), 0x106, 0x2}}, 0x20) (async) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) (async) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r2}}, 0x128) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x2) 07:25:54 executing program 1: clock_gettime(0x5, &(0x7f0000000500)) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0xffffffffffffff65) (async) pselect6(0x40, &(0x7f0000000380)={0x49259859, 0x6, 0x4, 0x5, 0x7f, 0x4, 0x4, 0x2}, &(0x7f00000003c0)={0x8e72, 0x5, 0x0, 0x5, 0xf0f5, 0x3, 0x7}, &(0x7f0000000400)={0x5, 0x101, 0x0, 0x0, 0x7cec, 0xfff, 0x3, 0x7}, &(0x7f0000000440)={0x77359400}, &(0x7f00000004c0)={&(0x7f0000000480)={[0xe18b]}, 0x8}) (async) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xa0280, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x80}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r3}}, 0xc) (async) r4 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r4, 0x0) (async) r5 = msgget(0x0, 0xc) msgctl$IPC_STAT(r5, 0x2, &(0x7f0000000100)=""/184) (async) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)={0x52, 0x400, 0xe9, {0x6, 0x782}, {0x8, 0x7}, @const={0xffff, {0x400, 0x5, 0xfffa, 0x8001}}}) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) socket$l2tp(0x2, 0x2, 0x73) (async) socket$nl_route(0x10, 0x3, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x28) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x13) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r2}}, 0x128) 07:25:54 executing program 1: clock_gettime(0x5, &(0x7f0000000500)) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0xffffffffffffff65) (async) pselect6(0x40, &(0x7f0000000380)={0x49259859, 0x6, 0x4, 0x5, 0x7f, 0x4, 0x4, 0x2}, &(0x7f00000003c0)={0x8e72, 0x5, 0x0, 0x5, 0xf0f5, 0x3, 0x7}, &(0x7f0000000400)={0x5, 0x101, 0x0, 0x0, 0x7cec, 0xfff, 0x3, 0x7}, &(0x7f0000000440)={0x77359400}, &(0x7f00000004c0)={&(0x7f0000000480)={[0xe18b]}, 0x8}) (async) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0xa0280, 0x0) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async, rerun: 64) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x80}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) (async, rerun: 64) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r3}}, 0xc) r4 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r4, 0x0) r5 = msgget(0x0, 0xc) msgctl$IPC_STAT(r5, 0x2, &(0x7f0000000100)=""/184) (async) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)={0x52, 0x400, 0xe9, {0x6, 0x782}, {0x8, 0x7}, @const={0xffff, {0x400, 0x5, 0xfffa, 0x8001}}}) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r4, 0x30, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r2}}, 0x128) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x7ffffffff000) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) socket$nl_route(0x10, 0x3, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) 07:25:54 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x14) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000200)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f0000000480)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r1}, 0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4}, 0xc) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r4}, 0xfffffffffffffe23) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x15) 07:25:54 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000200)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000200)={0xa, 0x4}, 0xc) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) (async) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400), 0x106, 0x2}}, 0x20) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x16) 07:25:54 executing program 3: socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 32) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) (async, rerun: 32) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) (rerun: 32) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r4}, 0xfffffffffffffe23) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r1}, 0x8) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4}, 0xc) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200, 0x0) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x17) 07:25:54 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x6, &(0x7f0000000000)) (async) 07:25:54 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) (async) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, 0x0, 0x0) (async) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000)={0x0, r4}, 0xfffffffffffffe23) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000200)={0xa, 0x4}, 0xc) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r1}, 0x8) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000080)={0xa, 0x4}, 0xc) (async, rerun: 32) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (rerun: 32) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 07:25:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x13, 0x8, 0xffffffc1, 0x0, 0x1348, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000880)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="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"]) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@typedef={0xf, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x5f, 0x30, 0x0, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000240)=""/98, 0x2c, 0x62}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@map_fd={0x18, 0xa, 0x1, 0x0, r0}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xca, &(0x7f0000000100)=""/202, 0x41100, 0xc, '\x00', r3, 0xd, r5, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x4, 0x7fff, 0xffffff30}, 0x10}, 0x80) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r1, 0x3}}, 0x10) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x18) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1, 'syzkaller0\x00', 0x4}, 0xffffffffffffff9b) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x13, 0x8, 0xffffffc1, 0x0, 0x1348, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000880)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="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"]) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@typedef={0xf, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x5f, 0x30, 0x0, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000240)=""/98, 0x2c, 0x62}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@map_fd={0x18, 0xa, 0x1, 0x0, r0}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xca, &(0x7f0000000100)=""/202, 0x41100, 0xc, '\x00', r3, 0xd, r5, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x4, 0x7fff, 0xffffff30}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x13, 0x8, 0xffffffc1, 0x0, 0x1348, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000880)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="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"]) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)}, 0x10) (async) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (async) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@typedef={0xf, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x5f, 0x30, 0x0, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000240)=""/98, 0x2c, 0x62}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@map_fd={0x18, 0xa, 0x1, 0x0, r0}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xca, &(0x7f0000000100)=""/202, 0x41100, 0xc, '\x00', r3, 0xd, r5, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x4, 0x7fff, 0xffffff30}, 0x10}, 0x80) (async) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r1, 0x3}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) (async) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r1, 0x3}}, 0x10) (async) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1, 'syzkaller0\x00', 0x4}, 0xffffffffffffff9b) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1, 'syzkaller0\x00', 0x4}, 0xffffffffffffff9b) (async) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}}}, 0x120) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x19) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x1a) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) (rerun: 32) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {r1, 0x3}}, 0x10) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1, 'syzkaller0\x00', 0x4}, 0xffffffffffffff9b) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}}}, 0x120) 07:25:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x13, 0x8, 0xffffffc1, 0x0, 0x1348, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000880)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="696c453000efa0d583630255b09a388e3e726921e53fd5b3ac3a5c9e7415d876023a98e982fdb29c1b21a750971398cd9be7d70fda9f191d41676018c60c30742668e868a9d3255172a61ea721ac2fd28c7703557133f8c6d06e1c0a181e539e591b988fda0b5d01d2a7ea0629b035a81268b5dabb29758a6fabc12a85077b04111a484e45d790a19000ec2d357f129217203a29266df3f15465377fdf3c749cdfccc35a4d0fbf99338e758b59b1fc799ddf894831fcc5f743f68a109f15e801712fd75563b91d9ccbab7f90bacea95d5d208590d40e476ae11e189500c9c4910fd030116e59f90783283ccb8991014755fc91386f9f71bd435d3f5f50ea1e92a66f"]) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@typedef={0xf, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x5f, 0x30, 0x0, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000240)=""/98, 0x2c, 0x62}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@map_fd={0x18, 0xa, 0x1, 0x0, r0}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xca, &(0x7f0000000100)=""/202, 0x41100, 0xc, '\x00', r3, 0xd, r5, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x4, 0x7fff, 0xffffff30}, 0x10}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x13, 0x8, 0xffffffc1, 0x0, 0x1348, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000880)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="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"]) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)}, 0x10) (async) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (async) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@typedef={0xf, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x5f, 0x30, 0x0, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000240)=""/98, 0x2c, 0x62}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@map_fd={0x18, 0xa, 0x1, 0x0, r0}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xca, &(0x7f0000000100)=""/202, 0x41100, 0xc, '\x00', r3, 0xd, r5, 0x8, &(0x7f0000000300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x4, 0x7fff, 0xffffff30}, 0x10}, 0x80) (async) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r7, 0x1c, 0x0, @ib={0x1b, 0xd51, 0x1000, {"6fee8f1a47db7f1e92b0874560fce7a4"}, 0x6, 0x100000000, 0xdb0b}}}, 0x90) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x21) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'ipvlan1\x00', 0x1}, 0x18) 07:25:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}}}, 0x120) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@empty, @rand_addr=0x64010100, 0x1, 0x1, [@multicast1]}, 0x14) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'erspan0\x00', 0x4}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x5, {"935b99433ff82120ba159681e00fb450"}, 0x8000000000000000, 0x250c, 0xffffffff00000000}, @in6={0xa, 0x4e22, 0x6, @local, 0x1ff}}}, 0x118) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x22) 07:25:54 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r7, 0x1c, 0x0, @ib={0x1b, 0xd51, 0x1000, {"6fee8f1a47db7f1e92b0874560fce7a4"}, 0x6, 0x100000000, 0xdb0b}}}, 0x90) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'ipvlan1\x00', 0x1}, 0x18) 07:25:54 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r0}}, 0x120) 07:25:54 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {r7, 0x1c, 0x0, @ib={0x1b, 0xd51, 0x1000, {"6fee8f1a47db7f1e92b0874560fce7a4"}, 0x6, 0x100000000, 0xdb0b}}}, 0x90) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@empty, @rand_addr=0x64010100, 0x1, 0x1, [@multicast1]}, 0x14) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'erspan0\x00', 0x4}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x5, {"935b99433ff82120ba159681e00fb450"}, 0x8000000000000000, 0x250c, 0xffffffff00000000}, @in6={0xa, 0x4e22, 0x6, @local, 0x1ff}}}, 0x118) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) getsockopt$inet_udp_int(r2, 0x11, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@empty, @rand_addr=0x64010100, 0x1, 0x1, [@multicast1]}, 0x14) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'erspan0\x00', 0x4}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x5, {"935b99433ff82120ba159681e00fb450"}, 0x8000000000000000, 0x250c, 0xffffffff00000000}, @in6={0xa, 0x4e22, 0x6, @local, 0x1ff}}}, 0x118) (async) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x31) 07:25:54 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'ipvlan1\x00', 0x1}, 0x18) 07:25:54 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r0}}, 0x120) 07:25:54 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async, rerun: 64) getsockopt$inet_udp_int(r2, 0x11, 0xa, &(0x7f00000001c0), &(0x7f0000000200)=0x4) (async, rerun: 64) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@empty, @rand_addr=0x64010100, 0x1, 0x1, [@multicast1]}, 0x14) (async, rerun: 64) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'erspan0\x00', 0x4}, 0x18) (rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @ib={0x1b, 0xfffd, 0x5, {"935b99433ff82120ba159681e00fb450"}, 0x8000000000000000, 0x250c, 0xffffffff00000000}, @in6={0xa, 0x4e22, 0x6, @local, 0x1ff}}}, 0x118) 07:25:54 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r7, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4}, r1}}, 0x128) 07:25:54 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 07:25:54 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x32) 07:25:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x36) 07:25:55 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x2100, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0xb, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x200}, [@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x1, 0x5, 0x30, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x2}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x800, 0x0, &(0x7f00000001c0), 0x41000, 0x4, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x6, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r5, 0x1, r6, r7, 0x1]}, 0x80) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:55 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r0}}, 0x120) 07:25:55 executing program 1: clock_gettime(0x3, &(0x7f0000000040)) 07:25:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r7, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb", 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4}, r1}}, 0x128) 07:25:55 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) 07:25:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:55 executing program 1: clock_gettime(0x3, &(0x7f0000000040)) clock_gettime(0x3, &(0x7f0000000040)) (async) 07:25:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) (async, rerun: 64) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(0xffffffffffffffff, &(0x7f0000000240)={0x7, 0x8, 0xfa00, {r7, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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", 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4}, r1}}, 0x128) 07:25:55 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x2100, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0xb, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x200}, [@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x1, 0x5, 0x30, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x2}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x800, 0x0, &(0x7f00000001c0), 0x41000, 0x4, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x6, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r5, 0x1, r6, r7, 0x1]}, 0x80) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)}, 0x10) (async) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (async) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x2100, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0xb, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x200}, [@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x1, 0x5, 0x30, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x2}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x800, 0x0, &(0x7f00000001c0), 0x41000, 0x4, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x6, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r5, 0x1, r6, r7, 0x1]}, 0x80) (async) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (async) 07:25:55 executing program 3: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:55 executing program 1: clock_gettime(0x3, &(0x7f0000000040)) clock_gettime(0x3, &(0x7f0000000040)) (async) 07:25:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x965b}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r3}}, 0x128) 07:25:55 executing program 3: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:55 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x2100, 0x0) (async) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, 0x0, 0x0) (async) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0xb, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x200}, [@map_idx={0x18, 0x5, 0x5, 0x0, 0x3}, @ldst={0x1, 0x0, 0x0, 0x1, 0x5, 0x30, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_fd={0x18, 0x2}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x800, 0x0, &(0x7f00000001c0), 0x41000, 0x4, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0xf, 0x6, 0x5}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000300)=[r5, 0x1, r6, r7, 0x1]}, 0x80) sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x4) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:55 executing program 1: clock_gettime(0x2, &(0x7f0000000040)) 07:25:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x965b}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r3}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240), 0x106, 0x6}}, 0x20) (async) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x965b}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r3}}, 0x128) (async) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:55 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) 07:25:55 executing program 1: clock_gettime(0x2, &(0x7f0000000040)) 07:25:55 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x2, 0x70bd2d, 0x25dfdbfa, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0xc8c0}, 0x4008010) r2 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r0) socket$inet_udplite(0x2, 0x2, 0x88) 07:25:55 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x3, 0x0, 0x0) 07:25:55 executing program 1: clock_gettime(0x2, &(0x7f0000000040)) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:55 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) (async) 07:25:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x965b}}, 0x10) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r3}}, 0x128) 07:25:55 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x3, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x3, 0x0, 0x0) (async) 07:25:55 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) (async) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:55 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x400000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f00000000c0)) ioctl$RTC_UIE_ON(r0, 0x7003) clock_gettime(0x6, &(0x7f0000000000)) 07:25:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x2, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee079bdcff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c02040092f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b951f8be69d7e234d587607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f20707000000ec460d5be4e4fb", 0x2, 0x80, 0x7, 0x4, 0x0, 0x0, 0x0, 0x4}, r1}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) 07:25:55 executing program 3: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) r2 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x3, 0x0, 0x0) 07:25:55 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x2, 0x70bd2d, 0x25dfdbfa, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0xc8c0}, 0x4008010) (async) r2 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (async) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r0) (async) socket$inet_udplite(0x2, 0x2, 0x88) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}}}, 0x120) 07:25:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x2, {0x0, 0x0, "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", 0x2, 0x80, 0x7, 0x4, 0x0, 0x0, 0x0, 0x4}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) 07:25:55 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_hsr\x00'}]}, 0x40}}, 0x48044) r1 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x50) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x400) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipmr_delroute={0x24, 0x19, 0x400, 0x70bd26, 0x25dfdbfb, {0x80, 0x14, 0x10, 0xc, 0xfe, 0x3, 0xfe, 0x8, 0x3780}, [@RTA_FLOW={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x811) 07:25:55 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x400000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f00000000c0)) ioctl$RTC_UIE_ON(r0, 0x7003) clock_gettime(0x6, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x400000) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) (async) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f00000000c0)) (async) ioctl$RTC_UIE_ON(r0, 0x7003) (async) clock_gettime(0x6, &(0x7f0000000000)) (async) 07:25:55 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x8000, 0x8, 0x80000001, 0x2, {{0x29, 0x4, 0x0, 0x29, 0xa4, 0x64, 0x0, 0x2, 0x29, 0x0, @multicast1, @private=0xa010102, {[@timestamp={0x44, 0x18, 0xc9, 0x0, 0x4, [0x7ff, 0x5186, 0x166, 0x3, 0x6]}, @timestamp={0x44, 0x14, 0xeb, 0x0, 0x8, [0x1, 0x9, 0x56b3, 0x7]}, @end, @timestamp={0x44, 0x2c, 0xf0, 0x0, 0x9, [0x400, 0x0, 0x8000, 0x0, 0x1, 0x7f, 0x7fffffff, 0x7d, 0x3, 0x0]}, @timestamp_prespec={0x44, 0x34, 0x97, 0x3, 0x7, [{@private=0xa010100, 0x9}, {@remote, 0x6}, {@loopback, 0x101}, {@private=0xa010100, 0x100}, {@local, 0x9}, {@private=0xa010101, 0x4}]}, @end]}}}}}) r1 = socket$l2tp(0x2, 0x2, 0x73) socket$inet(0x2, 0x3, 0x3ff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x29) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}}}, 0x120) 07:25:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x2, {0x0, 0x0, "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", 0x2, 0x80, 0x7, 0x4, 0x0, 0x0, 0x0, 0x4}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r1, 0x0, 0x2, 0x4}}, 0x20) 07:25:55 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_hsr\x00'}]}, 0x40}}, 0x48044) r1 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x50) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x400) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipmr_delroute={0x24, 0x19, 0x400, 0x70bd26, 0x25dfdbfb, {0x80, 0x14, 0x10, 0xc, 0xfe, 0x3, 0xfe, 0x8, 0x3780}, [@RTA_FLOW={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x811) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_hsr\x00'}]}, 0x40}}, 0x48044) (async) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x50) (async) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x400) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipmr_delroute={0x24, 0x19, 0x400, 0x70bd26, 0x25dfdbfb, {0x80, 0x14, 0x10, 0xc, 0xfe, 0x3, 0xfe, 0x8, 0x3780}, [@RTA_FLOW={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x811) (async) 07:25:55 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x400000) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f00000000c0)) ioctl$RTC_UIE_ON(r0, 0x7003) (async) clock_gettime(0x6, &(0x7f0000000000)) 07:25:55 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x8000, 0x8, 0x80000001, 0x2, {{0x29, 0x4, 0x0, 0x29, 0xa4, 0x64, 0x0, 0x2, 0x29, 0x0, @multicast1, @private=0xa010102, {[@timestamp={0x44, 0x18, 0xc9, 0x0, 0x4, [0x7ff, 0x5186, 0x166, 0x3, 0x6]}, @timestamp={0x44, 0x14, 0xeb, 0x0, 0x8, [0x1, 0x9, 0x56b3, 0x7]}, @end, @timestamp={0x44, 0x2c, 0xf0, 0x0, 0x9, [0x400, 0x0, 0x8000, 0x0, 0x1, 0x7f, 0x7fffffff, 0x7d, 0x3, 0x0]}, @timestamp_prespec={0x44, 0x34, 0x97, 0x3, 0x7, [{@private=0xa010100, 0x9}, {@remote, 0x6}, {@loopback, 0x101}, {@private=0xa010100, 0x100}, {@local, 0x9}, {@private=0xa010101, 0x4}]}, @end]}}}}}) r1 = socket$l2tp(0x2, 0x2, 0x73) socket$inet(0x2, 0x3, 0x3ff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x29) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x8000, 0x8, 0x80000001, 0x2, {{0x29, 0x4, 0x0, 0x29, 0xa4, 0x64, 0x0, 0x2, 0x29, 0x0, @multicast1, @private=0xa010102, {[@timestamp={0x44, 0x18, 0xc9, 0x0, 0x4, [0x7ff, 0x5186, 0x166, 0x3, 0x6]}, @timestamp={0x44, 0x14, 0xeb, 0x0, 0x8, [0x1, 0x9, 0x56b3, 0x7]}, @end, @timestamp={0x44, 0x2c, 0xf0, 0x0, 0x9, [0x400, 0x0, 0x8000, 0x0, 0x1, 0x7f, 0x7fffffff, 0x7d, 0x3, 0x0]}, @timestamp_prespec={0x44, 0x34, 0x97, 0x3, 0x7, [{@private=0xa010100, 0x9}, {@remote, 0x6}, {@loopback, 0x101}, {@private=0xa010100, 0x100}, {@local, 0x9}, {@private=0xa010101, 0x4}]}, @end]}}}}}) (async) socket$l2tp(0x2, 0x2, 0x73) (async) socket$inet(0x2, 0x3, 0x3ff) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x29) (async) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}}}, 0x120) 07:25:55 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x2, 0x70bd2d, 0x25dfdbfa, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0xc8c0}, 0x4008010) r2 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (async) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r0) (async, rerun: 64) socket$inet_udplite(0x2, 0x2, 0x88) (rerun: 64) 07:25:55 executing program 4: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_hsr\x00'}]}, 0x40}}, 0x48044) r1 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x50) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x400) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipmr_delroute={0x24, 0x19, 0x400, 0x70bd26, 0x25dfdbfb, {0x80, 0x14, 0x10, 0xc, 0xfe, 0x3, 0xfe, 0x8, 0x3780}, [@RTA_FLOW={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x811) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth0_to_hsr\x00'}]}, 0x40}}, 0x48044) (async) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x50) (async) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x400) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipmr_delroute={0x24, 0x19, 0x400, 0x70bd26, 0x25dfdbfb, {0x80, 0x14, 0x10, 0xc, 0xfe, 0x3, 0xfe, 0x8, 0x3780}, [@RTA_FLOW={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x811) (async) 07:25:55 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x8, 0x9, 0x0, 0xe8dd, 0x1, 0xfffffffffffff4fa, 0x7, 0x4}, &(0x7f00000000c0)={0x7, 0x9, 0x3, 0x8, 0x3, 0x2, 0x1, 0xffff}, &(0x7f0000000100)={0x3, 0x3, 0x9, 0x3, 0x5, 0x3, 0x7, 0x2}, &(0x7f0000000180)={r0, r1+60000000}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x400]}, 0x8}) clock_getres(0x5, &(0x7f0000000240)) clock_getres(0x9b000e5a1d764416, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000280)) 07:25:55 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x0, "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", 0x1}, r0}}, 0x128) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}}}, 0x120) 07:25:55 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x8000, 0x8, 0x80000001, 0x2, {{0x29, 0x4, 0x0, 0x29, 0xa4, 0x64, 0x0, 0x2, 0x29, 0x0, @multicast1, @private=0xa010102, {[@timestamp={0x44, 0x18, 0xc9, 0x0, 0x4, [0x7ff, 0x5186, 0x166, 0x3, 0x6]}, @timestamp={0x44, 0x14, 0xeb, 0x0, 0x8, [0x1, 0x9, 0x56b3, 0x7]}, @end, @timestamp={0x44, 0x2c, 0xf0, 0x0, 0x9, [0x400, 0x0, 0x8000, 0x0, 0x1, 0x7f, 0x7fffffff, 0x7d, 0x3, 0x0]}, @timestamp_prespec={0x44, 0x34, 0x97, 0x3, 0x7, [{@private=0xa010100, 0x9}, {@remote, 0x6}, {@loopback, 0x101}, {@private=0xa010100, 0x100}, {@local, 0x9}, {@private=0xa010101, 0x4}]}, @end]}}}}}) r1 = socket$l2tp(0x2, 0x2, 0x73) socket$inet(0x2, 0x3, 0x3ff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x29) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl2\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x8000, 0x8, 0x80000001, 0x2, {{0x29, 0x4, 0x0, 0x29, 0xa4, 0x64, 0x0, 0x2, 0x29, 0x0, @multicast1, @private=0xa010102, {[@timestamp={0x44, 0x18, 0xc9, 0x0, 0x4, [0x7ff, 0x5186, 0x166, 0x3, 0x6]}, @timestamp={0x44, 0x14, 0xeb, 0x0, 0x8, [0x1, 0x9, 0x56b3, 0x7]}, @end, @timestamp={0x44, 0x2c, 0xf0, 0x0, 0x9, [0x400, 0x0, 0x8000, 0x0, 0x1, 0x7f, 0x7fffffff, 0x7d, 0x3, 0x0]}, @timestamp_prespec={0x44, 0x34, 0x97, 0x3, 0x7, [{@private=0xa010100, 0x9}, {@remote, 0x6}, {@loopback, 0x101}, {@private=0xa010100, 0x100}, {@local, 0x9}, {@private=0xa010101, 0x4}]}, @end]}}}}}) (async) socket$l2tp(0x2, 0x2, 0x73) (async) socket$inet(0x2, 0x3, 0x3ff) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x29) (async) 07:25:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e23, 0x80000001, @remote, 0x6}}}, 0x38) 07:25:55 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (async, rerun: 32) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x0, "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", 0x1}, r0}}, 0x128) 07:25:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e23, 0x80000001, @remote, 0x6}}}, 0x38) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e23, 0x80000001, @remote, 0x6}}}, 0x38) (async) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}}}, 0x120) 07:25:55 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x8, 0x9, 0x0, 0xe8dd, 0x1, 0xfffffffffffff4fa, 0x7, 0x4}, &(0x7f00000000c0)={0x7, 0x9, 0x3, 0x8, 0x3, 0x2, 0x1, 0xffff}, &(0x7f0000000100)={0x3, 0x3, 0x9, 0x3, 0x5, 0x3, 0x7, 0x2}, &(0x7f0000000180)={r0, r1+60000000}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x400]}, 0x8}) clock_getres(0x5, &(0x7f0000000240)) clock_getres(0x9b000e5a1d764416, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x6, &(0x7f0000000000)) (async) clock_gettime(0x0, &(0x7f0000000140)) (async) pselect6(0x40, &(0x7f0000000080)={0x8, 0x9, 0x0, 0xe8dd, 0x1, 0xfffffffffffff4fa, 0x7, 0x4}, &(0x7f00000000c0)={0x7, 0x9, 0x3, 0x8, 0x3, 0x2, 0x1, 0xffff}, &(0x7f0000000100)={0x3, 0x3, 0x9, 0x3, 0x5, 0x3, 0x7, 0x2}, &(0x7f0000000180)={r0, r1+60000000}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x400]}, 0x8}) (async) clock_getres(0x5, &(0x7f0000000240)) (async) clock_getres(0x9b000e5a1d764416, &(0x7f0000000040)) (async) clock_gettime(0x0, &(0x7f0000000280)) (async) 07:25:55 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf8, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_OUT_KEY_ID={0xa8, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x3c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x26}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x78bb}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x18, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x40}]}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x800000}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xd0b0a691f202f484}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x9c, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xe574}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040004) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) 07:25:55 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd7000fddbdf250800000005001180b5c90000080017004166942a9d133d56292dd287b94fd258b1518e", @ANYRES32, @ANYBLOB="06001a004e2200000c000f00ffffffffffffffff"], 0x38}, 0x1, 0x0, 0x0, 0x400d0}, 0x4040804) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'caif0\x00', 0x2}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv6_getnetconf={0x24, 0x52, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@NETCONFA_IFINDEX={0x8}, @NETCONFA_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) 07:25:55 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x0, "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", 0x1}, r0}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x1, {0x0, 0x0, "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", 0x1}, r0}}, 0x128) (async) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}}}, 0x120) 07:25:55 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (async) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x8, 0x9, 0x0, 0xe8dd, 0x1, 0xfffffffffffff4fa, 0x7, 0x4}, &(0x7f00000000c0)={0x7, 0x9, 0x3, 0x8, 0x3, 0x2, 0x1, 0xffff}, &(0x7f0000000100)={0x3, 0x3, 0x9, 0x3, 0x5, 0x3, 0x7, 0x2}, &(0x7f0000000180)={r0, r1+60000000}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x400]}, 0x8}) (async) clock_getres(0x5, &(0x7f0000000240)) (async) clock_getres(0x9b000e5a1d764416, &(0x7f0000000040)) (async) clock_gettime(0x0, &(0x7f0000000280)) 07:25:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000040)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e23, 0x80000001, @remote, 0x6}}}, 0x38) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="04000000", @ANYRES16=0x0, @ANYBLOB="00022abd7000ffdbdf2500000000080011000000000006001d00020000000800090001000000050012001f000000"], 0x34}}, 0x40850) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:55 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000380)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:55 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:55 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000000)) (async) 07:25:55 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf8, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_OUT_KEY_ID={0xa8, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x3c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x26}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x78bb}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x18, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x40}]}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x800000}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xd0b0a691f202f484}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x9c, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xe574}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040004) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)}, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00'}) (async) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf8, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_OUT_KEY_ID={0xa8, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x3c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x26}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x78bb}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x18, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x40}]}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x800000}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vxcan0\x00'}) (async) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xd0b0a691f202f484}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x9c, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xe574}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040004) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) 07:25:55 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd7000fddbdf250800000005001180b5c90000080017004166942a9d133d56292dd287b94fd258b1518e", @ANYRES32, @ANYBLOB="06001a004e2200000c000f00ffffffffffffffff"], 0x38}, 0x1, 0x0, 0x0, 0x400d0}, 0x4040804) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'caif0\x00', 0x2}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv6_getnetconf={0x24, 0x52, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@NETCONFA_IFINDEX={0x8}, @NETCONFA_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) socket$l2tp(0x2, 0x2, 0x73) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd7000fddbdf250800000005001180b5c90000080017004166942a9d133d56292dd287b94fd258b1518e", @ANYRES32, @ANYBLOB="06001a004e2200000c000f00ffffffffffffffff"], 0x38}, 0x1, 0x0, 0x0, 0x400d0}, 0x4040804) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'caif0\x00', 0x2}, 0x18) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv6_getnetconf={0x24, 0x52, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@NETCONFA_IFINDEX={0x8}, @NETCONFA_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) (async) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:55 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) 07:25:55 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="04000000", @ANYRES16=0x0, @ANYBLOB="00022abd7000ffdbdf2500000000080011000000000006001d00020000000800090001000000050012001f000000"], 0x34}}, 0x40850) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:55 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_getres(0x5, &(0x7f0000000040)) 07:25:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:55 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080029bd7000fddbdf250800000005001180b5c90000080017004166942a9d133d56292dd287b94fd258b1518e", @ANYRES32, @ANYBLOB="06001a004e2200000c000f00ffffffffffffffff"], 0x38}, 0x1, 0x0, 0x0, 0x400d0}, 0x4040804) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'caif0\x00', 0x2}, 0x18) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv6_getnetconf={0x24, 0x52, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@NETCONFA_IFINDEX={0x8}, @NETCONFA_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) 07:25:56 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000380)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:56 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (async) clock_getres(0x5, &(0x7f0000000040)) 07:25:56 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 64) sendmsg$L2TP_CMD_NOOP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="04000000", @ANYRES16=0x0, @ANYBLOB="00022abd7000ffdbdf2500000000080011000000000006001d00020000000800090001000000050012001f000000"], 0x34}}, 0x40850) (rerun: 64) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x2}}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:56 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'veth0_to_bond\x00', 0x3}, 0x18) 07:25:56 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf8, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_OUT_KEY_ID={0xa8, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x3c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x26}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x78bb}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x18, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x40}]}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x800000}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xd0b0a691f202f484}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x9c, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xe574}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040004) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x58, &(0x7f0000000080)}, 0x10) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wpan3\x00'}) (async) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r3, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf8, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_OUT_KEY_ID={0xa8, 0x20, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x2}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x3c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0202}}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x26}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_INDEX={0x5}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x8}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x78bb}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x18, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}]}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x40}]}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x800000}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vxcan0\x00'}) (async) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xd0b0a691f202f484}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x9c, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xe574}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040004) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) 07:25:56 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'veth0_to_bond\x00', 0x3}, 0x18) 07:25:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x5, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:56 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (async) clock_getres(0x5, &(0x7f0000000040)) 07:25:56 executing program 3: socket$l2tp(0x2, 0x2, 0x73) 07:25:56 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) socket$l2tp(0x2, 0x2, 0x73) 07:25:57 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000380)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) (async, rerun: 32) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (rerun: 32) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 07:25:57 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000040)) 07:25:57 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'veth0_to_bond\x00', 0x3}, 0x18) 07:25:57 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) (async) socket$l2tp(0x2, 0x2, 0x73) 07:25:57 executing program 3: socket$l2tp(0x2, 0x2, 0x73) 07:25:57 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) socket$l2tp(0x2, 0x2, 0x73) 07:25:57 executing program 3: socket$l2tp(0x2, 0x2, 0x73) 07:25:57 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x105}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x240488c4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:57 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) (async) clock_gettime(0x0, &(0x7f0000000040)) 07:25:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 07:25:57 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 64) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x105}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x240488c4) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000580)=ANY=[@ANYBLOB="03edfff02ac76e11f9000100000018000000", @ANYRES32=r3, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r7, 0x6}}, 0x10) 07:25:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2a}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x480d4) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4044}, 0x20000884) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) sendmsg$IEEE802154_ASSOCIATE_RESP(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="000084f6", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25130000000c000900000000000000000006000800a0aa000006000800feff000005000300ff000000060008000000000006000800a2aa00000c0009000200aaaaaaaaaaaa0c0009000000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x3) 07:25:58 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000000)) (async) clock_gettime(0x0, &(0x7f0000000040)) (async) 07:25:58 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x105}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x240488c4) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x20, &(0x7f0000000200)={&(0x7f0000000100)=""/187, 0xbb, 0x0, &(0x7f00000001c0)=""/40, 0x28}}, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd27, 0x25dfdbfa, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x800) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x80, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000580)=ANY=[@ANYBLOB="03edfff02ac76e11f9000100000018000000", @ANYRES32=r3, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r7, 0x6}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000580)=ANY=[@ANYBLOB="03edfff02ac76e11f9000100000018000000", @ANYRES32=r3, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)}, 0x10) (async) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r7, 0x6}}, 0x10) (async) 07:25:58 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) (async) 07:25:58 executing program 1: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) clock_gettime(0x6, &(0x7f0000000000)) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x7, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x20, &(0x7f0000000200)={&(0x7f0000000100)=""/187, 0xbb, 0x0, &(0x7f00000001c0)=""/40, 0x28}}, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd27, 0x25dfdbfa, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x800) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) socket$l2tp(0x2, 0x2, 0x73) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x20, &(0x7f0000000200)={&(0x7f0000000100)=""/187, 0xbb, 0x0, &(0x7f00000001c0)=""/40, 0x28}}, 0x10) (async) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd27, 0x25dfdbfa, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x800) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (async) 07:25:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2a}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x480d4) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4044}, 0x20000884) (async) r1 = socket$l2tp(0x2, 0x2, 0x73) (async) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) sendmsg$IEEE802154_ASSOCIATE_RESP(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="000084f6", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25130000000c000900000000000000000006000800a0aa000006000800feff000005000300ff000000060008000000000006000800a2aa00000c0009000200aaaaaaaaaaaa0c0009000000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x3) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000580)=ANY=[@ANYBLOB="03edfff02ac76e11f9000100000018000000", @ANYRES32=r3, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r7, 0x6}}, 0x10) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000580)=ANY=[@ANYBLOB="03edfff02ac76e11f9000100000018000000", @ANYRES32=r3, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)}, 0x10) (async) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r5}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r7}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r7, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000200)={0x4, 0x8, 0xfa00, {r7, 0x6}}, 0x10) (async) 07:25:58 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) 07:25:58 executing program 1: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) clock_gettime(0x6, &(0x7f0000000000)) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) (async) clock_gettime(0x6, &(0x7f0000000000)) (async) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x20, &(0x7f0000000200)={&(0x7f0000000100)=""/187, 0xbb, 0x0, &(0x7f00000001c0)=""/40, 0x28}}, 0x10) (async) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd27, 0x25dfdbfa, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x800) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:58 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r3, 0x2, "8304f1", "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"}}, 0x110) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x7e71}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x3, 0x0, 0x0) socket(0x2, 0x80009, 0x7fffffff) 07:25:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2a}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x480d4) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}]}, 0x38}, 0x1, 0x0, 0x0, 0x4044}, 0x20000884) (async) r1 = socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 64) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000900)={'wpan4\x00'}) (async) sendmsg$IEEE802154_ASSOCIATE_RESP(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="000084f6", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25130000000c000900000000000000000006000800a0aa000006000800feff000005000300ff000000060008000000000006000800a2aa00000c0009000200aaaaaaaaaaaa0c0009000000000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x3) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x6, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r6, 0x20, 'k[g', "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"}}, 0x110) 07:25:58 executing program 1: syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) (async) clock_gettime(0x6, &(0x7f0000000000)) 07:25:58 executing program 3: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r3, 0x2, "8304f1", "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"}}, 0x110) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x7e71}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x10) (async) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x3, 0x0, 0x0) (async) socket(0x2, 0x80009, 0x7fffffff) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000075d35b976df743b1a418ce7a5ae42aab03f508aab4c8b525e0f72a1de693bde6ac5d8028dc3657c1f04c6830427c", @ANYRES16=0x0, @ANYBLOB="080026bd7000fbdbdf25080000000c000f00080000000000000008000a000300000005000d00000000000c00160013ffffffffffffff06001c00ff070000"], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (async, rerun: 64) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) (rerun: 64) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r6, 0x20, 'k[g', "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"}}, 0x110) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x9, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:58 executing program 1: sendmsg$NL802154_CMD_SET_SEC_PARAMS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000075d35b976df743b1a418ce7a5ae42aab03f508aab4c8b525e0f72a1de693bde6ac5d8028dc3657c1f04c6830427c", @ANYRES16=0x0, @ANYBLOB="080026bd7000fbdbdf25080000000c000f00080000000000000008000a000300000005000d00000000000c00160013ffffffffffffff06001c00ff070000"], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000075d35b976df743b1a418ce7a5ae42aab03f508aab4c8b525e0f72a1de693bde6ac5d8028dc3657c1f04c6830427c", @ANYRES16=0x0, @ANYBLOB="080026bd7000fbdbdf25080000000c000f00080000000000000008000a000300000005000d00000000000c00160013ffffffffffffff06001c00ff070000"], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) (async) 07:25:58 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r3, 0x2, "8304f1", "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"}}, 0x110) (async, rerun: 32) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_MTU={0x6, 0x1c, 0x7e71}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x10) (async, rerun: 32) r4 = socket$inet_udp(0x2, 0x2, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x3, 0x0, 0x0) (async) socket(0x2, 0x80009, 0x7fffffff) 07:25:58 executing program 1: sendmsg$NL802154_CMD_SET_SEC_PARAMS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) sendmsg$NL802154_CMD_SET_SEC_PARAMS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) (async) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000075d35b976df743b1a418ce7a5ae42aab03f508aab4c8b525e0f72a1de693bde6ac5d8028dc3657c1f04c6830427c", @ANYRES16=0x0, @ANYBLOB="080026bd7000fbdbdf25080000000c000f00080000000000000008000a000300000005000d00000000000c00160013ffffffffffffff06001c00ff070000"], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000075d35b976df743b1a418ce7a5ae42aab03f508aab4c8b525e0f72a1de693bde6ac5d8028dc3657c1f04c6830427c", @ANYRES16=0x0, @ANYBLOB="080026bd7000fbdbdf25080000000c000f00080000000000000008000a000300000005000d00000000000c00160013ffffffffffffff06001c00ff070000"], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) (async) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r5}}, 0xc) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r6, 0x20, 'k[g', "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"}}, 0x110) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(r2, 0x8400941f, &(0x7f0000000340)) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x74, 0x0, 0x102, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, '\x00', 0x42}}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'sit0\x00'}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 07:25:58 executing program 1: sendmsg$NL802154_CMD_SET_SEC_PARAMS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce", 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x1}, r1}}, 0x120) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'vcan0\x00'}, 0x18) clock_getres(0x7, &(0x7f0000000000)) 07:25:58 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r2}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0000bd7000fddbdf250278c4fd000000000000abdc5c90dbe818183e40148ca9f941d2c17d8d07be70cfaa5ab2d1c73e91f654d83ad3933ea29603106f293446bfa436e48da9b13c2c61032e24b4f3883a084cb9fce652e3c3922f0d9a40ef1166b30be8fda4e12230262e05d97a500d605b9c70fc0ba0370dc30b2c1cc25407c6a56bac8fc9909e", @ANYRES32=r2, @ANYBLOB="1400030067726574617030000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r7, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r6}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x8000, 0x8000, 0xd6, 0x10001, {{0x1d, 0x4, 0x0, 0x24, 0x74, 0x67, 0x0, 0x7, 0x4, 0x0, @multicast2, @broadcast, {[@timestamp_prespec={0x44, 0x24, 0xd1, 0x3, 0x5, [{@private=0xa010101, 0x3}, {@private=0xa010101, 0x4}, {@loopback, 0x6}, {@rand_addr=0x64010100, 0x401}]}, @timestamp_prespec={0x44, 0x3c, 0xab, 0x3, 0x7, [{@dev={0xac, 0x14, 0x14, 0x23}}, {@multicast2, 0x80}, {@multicast1, 0x8001}, {@empty, 0x7f}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x80}, {@dev={0xac, 0x14, 0x14, 0x1e}, 0x4}, {@multicast1, 0x40}]}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f00000001c0)={0x29c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [{{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x13c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}]}, 0x29c}, 0x1, 0x0, 0x0, 0x801}, 0x4008000) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) ioctl$BTRFS_IOC_FS_INFO(r2, 0x8400941f, &(0x7f0000000340)) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x74, 0x0, 0x102, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, '\x00', 0x42}}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'sit0\x00'}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) 07:25:58 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) clock_gettime(0x5, &(0x7f0000000080)) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1}, r1}}, 0x120) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'vcan0\x00'}, 0x18) (async, rerun: 64) clock_getres(0x7, &(0x7f0000000000)) (rerun: 64) 07:25:58 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='ext4_ext_convert_to_initialized_fastpath\x00', r0}, 0x10) r2 = inotify_init1(0x0) copy_file_range(r1, &(0x7f0000000180)=0x8, r2, &(0x7f00000001c0), 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="aae45b0600000051c82fd421c7c530fff0997a43b52917e3d261b3643514f9915812d7b661a2194ed92bcedd172ed2f77454ba7420b1930300a604f9be5e38013359414d107fb900"/87]) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f00000009c0)=ANY=[@ANYBLOB="f40000ad9192cea0001800010025bd7000fcdbdf250a008006fe02fd0b00000000050014000300000005001400d40000000c00090005000009", @ANYRES32=r7, @ANYBLOB="1200088067ab4dd94183642d1dbd27e368ad00001400050000000000000000000000ffff0a01010285000880d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce30000000c000900faff0207", @ANYRES32=0x0, @ANYBLOB], 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r9}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r9, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000280)=0x5b, r9, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r3, 0x0, 0x1, 0x4}}, 0x20) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x29) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x1f7, 0x1, 0x3, 0x1}]}) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async, rerun: 64) ioctl$BTRFS_IOC_FS_INFO(r2, 0x8400941f, &(0x7f0000000340)) (async, rerun: 64) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async, rerun: 32) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x74, 0x0, 0x102, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @dev={0xfe, 0x80, '\x00', 0x42}}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x7}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x2}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'sit0\x00'}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x1}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6f}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x4}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) (rerun: 32) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1}}, 0x120) 07:25:58 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='ext4_ext_convert_to_initialized_fastpath\x00', r0}, 0x10) r2 = inotify_init1(0x0) copy_file_range(r1, &(0x7f0000000180)=0x8, r2, &(0x7f00000001c0), 0x7, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="aae45b0600000051c82fd421c7c530fff0997a43b52917e3d261b3643514f9915812d7b661a2194ed92bcedd172ed2f77454ba7420b1930300a604f9be5e38013359414d107fb900"/87]) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f00000009c0)=ANY=[@ANYBLOB="f40000ad9192cea0001800010025bd7000fcdbdf250a008006fe02fd0b00000000050014000300000005001400d40000000c00090005000009", @ANYRES32=r7, @ANYBLOB="1200088067ab4dd94183642d1dbd27e368ad00001400050000000000000000000000ffff0a01010285000880d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce30000000c000900faff0207", @ANYRES32=0x0, @ANYBLOB], 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r9}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r9, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000280)=0x5b, r9, 0x0, 0x0, 0x1}}, 0x20) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r3, 0x0, 0x1, 0x4}}, 0x20) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x29) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x1f7, 0x1, 0x3, 0x1}]}) 07:25:58 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) (async) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r2}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0000bd7000fddbdf250278c4fd000000000000abdc5c90dbe818183e40148ca9f941d2c17d8d07be70cfaa5ab2d1c73e91f654d83ad3933ea29603106f293446bfa436e48da9b13c2c61032e24b4f3883a084cb9fce652e3c3922f0d9a40ef1166b30be8fda4e12230262e05d97a500d605b9c70fc0ba0370dc30b2c1cc25407c6a56bac8fc9909e", @ANYRES32=r2, @ANYBLOB="1400030067726574617030000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r7, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r6}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x8000, 0x8000, 0xd6, 0x10001, {{0x1d, 0x4, 0x0, 0x24, 0x74, 0x67, 0x0, 0x7, 0x4, 0x0, @multicast2, @broadcast, {[@timestamp_prespec={0x44, 0x24, 0xd1, 0x3, 0x5, [{@private=0xa010101, 0x3}, {@private=0xa010101, 0x4}, {@loopback, 0x6}, {@rand_addr=0x64010100, 0x401}]}, @timestamp_prespec={0x44, 0x3c, 0xab, 0x3, 0x7, [{@dev={0xac, 0x14, 0x14, 0x23}}, {@multicast2, 0x80}, {@multicast1, 0x8001}, {@empty, 0x7f}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x80}, {@dev={0xac, 0x14, 0x14, 0x1e}, 0x4}, {@multicast1, 0x40}]}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f00000001c0)={0x29c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [{{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x13c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}]}, 0x29c}, 0x1, 0x0, 0x0, 0x801}, 0x4008000) 07:25:58 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) clock_gettime(0x5, &(0x7f0000000080)) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'vcan0\x00'}, 0x18) clock_getres(0x7, &(0x7f0000000000)) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'vcan0\x00'}, 0x18) (async) clock_getres(0x7, &(0x7f0000000000)) (async) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, r1}}, 0x120) 07:25:58 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async, rerun: 32) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='ext4_ext_convert_to_initialized_fastpath\x00', r0}, 0x10) (async, rerun: 32) r2 = inotify_init1(0x0) copy_file_range(r1, &(0x7f0000000180)=0x8, r2, &(0x7f00000001c0), 0x7, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) (async) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB="aae45b0600000051c82fd421c7c530fff0997a43b52917e3d261b3643514f9915812d7b661a2194ed92bcedd172ed2f77454ba7420b1930300a604f9be5e38013359414d107fb900"/87]) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f00000009c0)=ANY=[@ANYBLOB="f40000ad9192cea0001800010025bd7000fcdbdf250a008006fe02fd0b00000000050014000300000005001400d40000000c00090005000009", @ANYRES32=r7, @ANYBLOB="1200088067ab4dd94183642d1dbd27e368ad00001400050000000000000000000000ffff0a01010285000880d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce30000000c000900faff0207", @ANYRES32=0x0, @ANYBLOB], 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r9}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r9, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000280)=0x5b, r9, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000), r3, 0x0, 0x1, 0x4}}, 0x20) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x29) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x1f7, 0x1, 0x3, 0x1}]}) 07:25:58 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r2}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0000bd7000fddbdf250278c4fd000000000000abdc5c90dbe818183e40148ca9f941d2c17d8d07be70cfaa5ab2d1c73e91f654d83ad3933ea29603106f293446bfa436e48da9b13c2c61032e24b4f3883a084cb9fce652e3c3922f0d9a40ef1166b30be8fda4e12230262e05d97a500d605b9c70fc0ba0370dc30b2c1cc25407c6a56bac8fc9909e", @ANYRES32=r2, @ANYBLOB="1400030067726574617030000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r7, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r6}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x8000, 0x8000, 0xd6, 0x10001, {{0x1d, 0x4, 0x0, 0x24, 0x74, 0x67, 0x0, 0x7, 0x4, 0x0, @multicast2, @broadcast, {[@timestamp_prespec={0x44, 0x24, 0xd1, 0x3, 0x5, [{@private=0xa010101, 0x3}, {@private=0xa010101, 0x4}, {@loopback, 0x6}, {@rand_addr=0x64010100, 0x401}]}, @timestamp_prespec={0x44, 0x3c, 0xab, 0x3, 0x7, [{@dev={0xac, 0x14, 0x14, 0x23}}, {@multicast2, 0x80}, {@multicast1, 0x8001}, {@empty, 0x7f}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x80}, {@dev={0xac, 0x14, 0x14, 0x1e}, 0x4}, {@multicast1, 0x40}]}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f00000001c0)={0x29c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [{{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x13c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}]}, 0x29c}, 0x1, 0x0, 0x0, 0x801}, 0x4008000) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) (async) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x58, &(0x7f0000000640)}, 0x10) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r2}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (async) sendmsg$nl_route(r3, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000880)=ANY=[@ANYBLOB="2c0000bd7000fddbdf250278c4fd000000000000abdc5c90dbe818183e40148ca9f941d2c17d8d07be70cfaa5ab2d1c73e91f654d83ad3933ea29603106f293446bfa436e48da9b13c2c61032e24b4f3883a084cb9fce652e3c3922f0d9a40ef1166b30be8fda4e12230262e05d97a500d605b9c70fc0ba0370dc30b2c1cc25407c6a56bac8fc9909e", @ANYRES32=r2, @ANYBLOB="1400030067726574617030000000000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r4, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r5, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r4, 0x58, &(0x7f0000000640)}, 0x10) (async) sendmsg$nl_route(r4, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r6}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (async) sendmsg$nl_route(r7, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r6}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x8000, 0x8000, 0xd6, 0x10001, {{0x1d, 0x4, 0x0, 0x24, 0x74, 0x67, 0x0, 0x7, 0x4, 0x0, @multicast2, @broadcast, {[@timestamp_prespec={0x44, 0x24, 0xd1, 0x3, 0x5, [{@private=0xa010101, 0x3}, {@private=0xa010101, 0x4}, {@loopback, 0x6}, {@rand_addr=0x64010100, 0x401}]}, @timestamp_prespec={0x44, 0x3c, 0xab, 0x3, 0x7, [{@dev={0xac, 0x14, 0x14, 0x23}}, {@multicast2, 0x80}, {@multicast1, 0x8001}, {@empty, 0x7f}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x80}, {@dev={0xac, 0x14, 0x14, 0x1e}, 0x4}, {@multicast1, 0x40}]}]}}}}}) (async) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f00000001c0)={0x29c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [{{0x8}, {0xbc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x13c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}]}, 0x29c}, 0x1, 0x0, 0x0, 0x801}, 0x4008000) (async) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) copy_file_range(r1, &(0x7f0000000200)=0x605388ec, r0, &(0x7f0000000240), 0xe28, 0x0) r2 = socket$inet(0x2, 0x5, 0x4) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet_dccp(0x2, 0x6, 0x0) copy_file_range(r3, &(0x7f0000000300), r4, &(0x7f0000000380)=0x7, 0x8000000000000000, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0xfffffffc, "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"}, r5}}, 0x128) 07:25:58 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) (async) clock_gettime(0x5, &(0x7f0000000080)) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) msgctl$IPC_RMID(0x0, 0x0) getgroups(0x8, &(0x7f0000000140)=[0xee01, 0xee01, 0x0, 0xee01, 0xee01, 0x0, 0xee00, 0xee00]) r5 = getpgid(0xffffffffffffffff) r6 = getpgid(0x0) getpgid(r6) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x2, 0x0, r4, 0xee00, 0x0, 0x1f2, 0x81}, 0x0, 0x0, 0x1, 0x401, 0x80, 0x2, 0xffffffffffffffff, 0x7, 0x2, 0x2, r5, r6}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000bc0)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x1, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x3cc7, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x2, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r8}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r10}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r10, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r10, 0x1}}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x2, 'veth1_to_hsr\x00'}, 0x18) [ 491.016990][ T1442] ================================================================== [ 491.025198][ T1442] BUG: KCSAN: data-race in blkdev_get_by_dev / blkdev_put [ 491.032319][ T1442] [ 491.034641][ T1442] write to 0xffff8881004330e8 of 4 bytes by task 1829 on cpu 0: [ 491.042267][ T1442] blkdev_get_by_dev+0x88b/0x9e0 [ 491.047213][ T1442] blkdev_open+0xac/0x140 [ 491.051557][ T1442] do_dentry_open+0x519/0x830 [ 491.056237][ T1442] vfs_open+0x43/0x50 [ 491.060279][ T1442] path_openat+0x16cf/0x1b30 07:25:58 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0xffffffffffffff90) socket$inet_udp(0x2, 0x2, 0x0) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce"}, r1}}, 0x120) 07:25:58 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7fff}}, './file0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_newvlan={0x30, 0x70, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xc}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_MCAST_ROUTER={0x5, 0x6, 0x5}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20048041}, 0x4000) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 32) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) (async, rerun: 32) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async, rerun: 32) r3 = socket$inet_udp(0x2, 0x2, 0x0) (async, rerun: 32) msgctl$IPC_RMID(0x0, 0x0) getgroups(0x8, &(0x7f0000000140)=[0xee01, 0xee01, 0x0, 0xee01, 0xee01, 0x0, 0xee00, 0xee00]) r5 = getpgid(0xffffffffffffffff) r6 = getpgid(0x0) getpgid(r6) (async, rerun: 64) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x2, 0x0, r4, 0xee00, 0x0, 0x1f2, 0x81}, 0x0, 0x0, 0x1, 0x401, 0x80, 0x2, 0xffffffffffffffff, 0x7, 0x2, 0x2, r5, r6}) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000bc0)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x1, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x3cc7, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x2, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r8}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r10}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r10, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r10, 0x1}}, 0x18) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x2, 'veth1_to_hsr\x00'}, 0x18) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}, r1}}, 0x120) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) msgctl$IPC_RMID(0x0, 0x0) getgroups(0x8, &(0x7f0000000140)=[0xee01, 0xee01, 0x0, 0xee01, 0xee01, 0x0, 0xee00, 0xee00]) r5 = getpgid(0xffffffffffffffff) r6 = getpgid(0x0) getpgid(r6) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x2, 0x0, r4, 0xee00, 0x0, 0x1f2, 0x81}, 0x0, 0x0, 0x1, 0x401, 0x80, 0x2, 0xffffffffffffffff, 0x7, 0x2, 0x2, r5, r6}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000bc0)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x1, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x3cc7, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x2, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r8}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r10}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r10, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r10, 0x1}}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x2, 'veth1_to_hsr\x00'}, 0x18) socket$l2tp(0x2, 0x2, 0x73) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) msgctl$IPC_RMID(0x0, 0x0) (async) getgroups(0x8, &(0x7f0000000140)=[0xee01, 0xee01, 0x0, 0xee01, 0xee01, 0x0, 0xee00, 0xee00]) (async) getpgid(0xffffffffffffffff) (async) getpgid(0x0) (async) getpgid(r6) (async) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x2, 0x0, r4, 0xee00, 0x0, 0x1f2, 0x81}, 0x0, 0x0, 0x1, 0x401, 0x80, 0x2, 0xffffffffffffffff, 0x7, 0x2, 0x2, r5, r6}) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000bc0)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x1, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x3cc7, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x2, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)}, 0x10) (async) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r8}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r9, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r10}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r7, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r10, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r10, 0x1}}, 0x18) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x2, 'veth1_to_hsr\x00'}, 0x18) (async) 07:25:58 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/231) clock_getres(0x0, 0xffffffffffffffff) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) syz_open_dev$rtc(&(0x7f0000000140), 0x18, 0x201) [ 491.064874][ T1442] do_filp_open+0x105/0x220 [ 491.069380][ T1442] do_sys_openat2+0xb5/0x2a0 [ 491.073975][ T1442] __x64_sys_openat+0xef/0x110 [ 491.078738][ T1442] do_syscall_64+0x2b/0x70 [ 491.083155][ T1442] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 491.089052][ T1442] [ 491.091381][ T1442] read to 0xffff8881004330e8 of 4 bytes by task 1442 on cpu 1: [ 491.098922][ T1442] blkdev_put+0x3b/0x440 [ 491.103169][ T1442] blkdev_close+0x32/0x40 [ 491.107542][ T1442] __fput+0x292/0x510 [ 491.111529][ T1442] ____fput+0x11/0x20 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (rerun: 64) copy_file_range(r1, &(0x7f0000000200)=0x605388ec, r0, &(0x7f0000000240), 0xe28, 0x0) (async) r2 = socket$inet(0x2, 0x5, 0x4) (async) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) (async) r4 = socket$inet_dccp(0x2, 0x6, 0x0) copy_file_range(r3, &(0x7f0000000300), r4, &(0x7f0000000380)=0x7, 0x8000000000000000, 0x0) (async) getsockopt$inet_udp_int(r2, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0xfffffffc, "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"}, r5}}, 0x128) 07:25:58 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7fff}}, './file0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_newvlan={0x30, 0x70, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xc}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_MCAST_ROUTER={0x5, 0x6, 0x5}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20048041}, 0x4000) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7fff}}, './file0\x00'}) (async) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_newvlan={0x30, 0x70, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xc}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_MCAST_ROUTER={0x5, 0x6, 0x5}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20048041}, 0x4000) (async) 07:25:58 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (async) r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/231) clock_getres(0x0, 0xffffffffffffffff) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$RTC_UIE_ON(r1, 0x7003) (async) syz_open_dev$rtc(&(0x7f0000000140), 0x18, 0x201) 07:25:58 executing program 3: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0xffffffffffffff90) socket$inet_udp(0x2, 0x2, 0x0) [ 491.115516][ T1442] task_work_run+0x8e/0x110 [ 491.120025][ T1442] exit_to_user_mode_loop+0x124/0x130 [ 491.125396][ T1442] syscall_exit_to_user_mode+0x6a/0x90 [ 491.130857][ T1442] do_syscall_64+0x37/0x70 [ 491.135270][ T1442] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 491.141163][ T1442] [ 491.143479][ T1442] value changed: 0x00000001 -> 0x00000002 [ 491.149190][ T1442] [ 491.151512][ T1442] Reported by Kernel Concurrency Sanitizer on: [ 491.157650][ T1442] CPU: 1 PID: 1442 Comm: udevd Not tainted 5.18.0-rc3-syzkaller-00250-g42740a2ff5d3-dirty #0 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xfffffffa, @mcast2, 0x4}, {0xa, 0x4e24, 0x4, @mcast2, 0x9}, 0xffffffffffffffff, 0x9}}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xfffffffa, @mcast2, 0x4}, {0xa, 0x4e24, 0x4, @mcast2, 0x9}, 0xffffffffffffffff, 0x9}}, 0x48) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) socket$l2tp(0x2, 0x2, 0x73) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xfffffffa, @mcast2, 0x4}, {0xa, 0x4e24, 0x4, @mcast2, 0x9}, 0xffffffffffffffff, 0x9}}, 0x48) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (async) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) 07:25:58 executing program 4: setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x3) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x7fff}}, './file0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@bridge_newvlan={0x30, 0x70, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_RANGE={0x6, 0x2, 0xc}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_MCAST_ROUTER={0x5, 0x6, 0x5}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20048041}, 0x4000) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "c24b22ac9be65beed4519aefe97f8c4b8f0e9ca0b20634a306e34a59aff6e41ba2c4a04a4147f0b2e2b439b8bc83a7e11cf0b1c3f112e2c341d53d70af8690b81d3e9e52d6fb4161acceaf0f98b875b66dd63d0a94df8ca3cb3ed05d01a3d4a2c1ba441e8aaaa9445192eaebbdef82cb7a0a15bfe9a49f44cf3b0ea518ab3f65b0d3e9a3d017baba23959d5b7aa855292c485560e15e4d43ada969bd374391cb15c67d9b605a3369c8e7fec6b605a533a1eb4b044be95ab232bcf4a70c51a29d7a84819699009d53c43ca42dafa9fdeaa40c9592f0547130b0c288492d991cc47053bb86b8a92834b9a295a727cbfe5bcb75125e4c5b537cb3c4eeb424ed29ce", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}}, 0x120) 07:25:58 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (async) r0 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) (async) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/231) (async) clock_getres(0x0, 0xffffffffffffffff) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) ioctl$RTC_UIE_ON(r1, 0x7003) syz_open_dev$rtc(&(0x7f0000000140), 0x18, 0x201) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) (async, rerun: 64) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000000)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xfffffffa, @mcast2, 0x4}, {0xa, 0x4e24, 0x4, @mcast2, 0x9}, 0xffffffffffffffff, 0x9}}, 0x48) (rerun: 64) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:58 executing program 3: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x3, 0x0, 0xffffffffffffff90) socket$inet_udp(0x2, 0x2, 0x0) [ 491.167798][ T1442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.177851][ T1442] ================================================================== 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) copy_file_range(r1, &(0x7f0000000200)=0x605388ec, r0, &(0x7f0000000240), 0xe28, 0x0) (async) r2 = socket$inet(0x2, 0x5, 0x4) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet_dccp(0x2, 0x6, 0x0) copy_file_range(r3, &(0x7f0000000300), r4, &(0x7f0000000380)=0x7, 0x8000000000000000, 0x0) (async) getsockopt$inet_udp_int(r2, 0x11, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0x4) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0xfffffffc, "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"}, r5}}, 0x128) 07:25:58 executing program 4: socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r6, 0x20, 'k[g', "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"}}, 0x110) 07:25:58 executing program 3: pipe2$watch_queue(&(0x7f00000001c0), 0x80) socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x7, 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x4, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x23b6, 0x9, {"e9b98688afbd204ec83c342c6906f61d"}, 0xfffffffffffffc01, 0x37a9, 0x40}}}, 0xa0) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) 07:25:58 executing program 4: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) 07:25:58 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x2, &(0x7f0000000040)) clock_getres(0x3, &(0x7f0000000080)) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r6, 0x20, 'k[g', "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"}}, 0x110) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) syz_open_dev$vcsa(&(0x7f0000000000), 0x7, 0xa0001) socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:58 executing program 3: pipe2$watch_queue(&(0x7f00000001c0), 0x80) (async) socket$l2tp(0x2, 0x2, 0x73) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x7, 0x4) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x4, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x23b6, 0x9, {"e9b98688afbd204ec83c342c6906f61d"}, 0xfffffffffffffc01, 0x37a9, 0x40}}}, 0xa0) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) 07:25:58 executing program 4: socket$l2tp(0x2, 0x2, 0x73) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) 07:25:58 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x2, &(0x7f0000000040)) (async) clock_getres(0x3, &(0x7f0000000080)) 07:25:58 executing program 4: ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x24b9b14643b83e14}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x2, {0xa, 0x4e24, 0x7, @loopback, 0x56}, r1}}, 0x38) r2 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8935, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) syz_open_dev$vcsa(&(0x7f0000000000), 0x7, 0xa0001) socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) socket$l2tp(0x2, 0x2, 0x73) (async) syz_open_dev$vcsa(&(0x7f0000000000), 0x7, 0xa0001) (async) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (async) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r6, 0x20, 'k[g', "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"}}, 0x110) 07:25:58 executing program 3: pipe2$watch_queue(&(0x7f00000001c0), 0x80) (async) socket$l2tp(0x2, 0x2, 0x73) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x0) (async) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x7, 0x4) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000100)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x4, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x23b6, 0x9, {"e9b98688afbd204ec83c342c6906f61d"}, 0xfffffffffffffc01, 0x37a9, 0x40}}}, 0xa0) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) 07:25:58 executing program 4: ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) (async) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) (async) 07:25:58 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x2, &(0x7f0000000040)) (async) clock_getres(0x3, &(0x7f0000000080)) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x24b9b14643b83e14}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x2, {0xa, 0x4e24, 0x7, @loopback, 0x56}, r1}}, 0x38) r2 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8935, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x24b9b14643b83e14}}, 0x20) (async) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x2, {0xa, 0x4e24, 0x7, @loopback, 0x56}, r1}}, 0x38) (async) socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8935, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) syz_open_dev$vcsa(&(0x7f0000000000), 0x7, 0xa0001) (async) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:58 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x4}, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x24b9b14643b83e14}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x2, {0xa, 0x4e24, 0x7, @loopback, 0x56}, r1}}, 0x38) (async) r2 = socket$l2tp(0x2, 0x2, 0x73) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8935, 0x0) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:58 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x111}, 0x4000080) clock_gettime(0x6, &(0x7f0000000000)) ioperm(0xf35b, 0x6, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x40844) r1 = socket(0x1d, 0x2, 0x7) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000240)=0x5, 0x4) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0), 0x2, 0x4}}, 0x20) 07:25:58 executing program 4: ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) (async) r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) 07:25:58 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x111}, 0x4000080) (async, rerun: 64) clock_gettime(0x6, &(0x7f0000000000)) (rerun: 64) ioperm(0xf35b, 0x6, 0x3) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x40844) (async) r1 = socket(0x1d, 0x2, 0x7) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000240)=0x5, 0x4) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x8002, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0x101, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080)=0xffffffffffffffff, 0x12) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r6, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x3, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x2, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r5, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="f40000001800010025bd7000fcdbdf250a008006fe02fd0b00000000050014000300000005001400d40000000c00090005000009", @ANYRES32=r7, @ANYBLOB="1200088067ab4dd94183642d1dbd27e368ad00001400050000000000000000000000ffff0a01010285000880d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce30000000c000900faff0207", @ANYRES32=0x0, @ANYBLOB="63a14d20126a57dee003b8afbda8e21e94f9d95d9a3469fb67251ebcc16c2f6e3bc1bd29c45679092cd823cca00c29000000ef09af55daf61ad5fd762805911795d116b515edae35ee6ca7de93ce56fb00"/92], 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r8, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2c0000001600000425bd7000fddbdf250278c4fd", @ANYRES32=r7, @ANYBLOB="1400030067726574617030000000000000000000c2f02514fda59b5fdef4b10d0490320e339c808ed2a080289bb78cce7a5d656440b3d3360d77dfa243eb5ab49647aab6ccf40de5ca39cd5083d9f256537e37e6d7ff29109431cffdce8ac51eac1cd4dc0c9cc6fdd7a0f38c087f9f6433be880653a7bfa739a5e60ccb78d794aab5342345ad25c9e5a42f47081277d34a7ad5ef8f4f4cafc70d2cf74db57f3a6c8135965ff76401bd506060b52e69b7f7f47a773a643a6a502d09ed6d9bba2019f088ecee53a9face8d114be74d4abe35b1955d56c5add37d1f131c95d6610387"], 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x38c, 0x0, 0x421, 0x70bd2e, 0x25dfdbfd, {}, [{{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb509}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2300acbc}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x345}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x19aae890}}, {0x8, 0x6, r7}}}]}}]}, 0x38c}}, 0x4040) 07:25:58 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x4}, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) socket$l2tp(0x2, 0x2, 0x73) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x4}, 0x8) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r5}}, 0xc) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, 0x0, 0x0) 07:25:58 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r2, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xcc}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x801}, 0x40080d4) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x8002, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0x101, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 32) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async, rerun: 64) r6 = socket$inet_udp(0x2, 0x2, 0x0) (async, rerun: 64) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080)=0xffffffffffffffff, 0x12) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r6, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x3, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x2, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r5, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="f40000001800010025bd7000fcdbdf250a008006fe02fd0b00000000050014000300000005001400d40000000c00090005000009", @ANYRES32=r7, @ANYBLOB="1200088067ab4dd94183642d1dbd27e368ad00001400050000000000000000000000ffff0a01010285000880d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce30000000c000900faff0207", @ANYRES32=0x0, @ANYBLOB="63a14d20126a57dee003b8afbda8e21e94f9d95d9a3469fb67251ebcc16c2f6e3bc1bd29c45679092cd823cca00c29000000ef09af55daf61ad5fd762805911795d116b515edae35ee6ca7de93ce56fb00"/92], 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r8, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2c0000001600000425bd7000fddbdf250278c4fd", @ANYRES32=r7, @ANYBLOB="1400030067726574617030000000000000000000c2f02514fda59b5fdef4b10d0490320e339c808ed2a080289bb78cce7a5d656440b3d3360d77dfa243eb5ab49647aab6ccf40de5ca39cd5083d9f256537e37e6d7ff29109431cffdce8ac51eac1cd4dc0c9cc6fdd7a0f38c087f9f6433be880653a7bfa739a5e60ccb78d794aab5342345ad25c9e5a42f47081277d34a7ad5ef8f4f4cafc70d2cf74db57f3a6c8135965ff76401bd506060b52e69b7f7f47a773a643a6a502d09ed6d9bba2019f088ecee53a9face8d114be74d4abe35b1955d56c5add37d1f131c95d6610387"], 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x38c, 0x0, 0x421, 0x70bd2e, 0x25dfdbfd, {}, [{{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb509}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2300acbc}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x345}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x19aae890}}, {0x8, 0x6, r7}}}]}}]}, 0x38c}}, 0x4040) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r1, 0xffffe772}}, 0x10) 07:25:58 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x4}, 0x8) (async, rerun: 64) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (rerun: 64) 07:25:58 executing program 1: sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x111}, 0x4000080) clock_gettime(0x6, &(0x7f0000000000)) ioperm(0xf35b, 0x6, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x40844) r1 = socket(0x1d, 0x2, 0x7) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000240)=0x5, 0x4) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x111}, 0x4000080) (async) clock_gettime(0x6, &(0x7f0000000000)) (async) ioperm(0xf35b, 0x6, 0x3) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x400c0}, 0x40844) (async) socket(0x1d, 0x2, 0x7) (async) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000240)=0x5, 0x4) (async) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000500)={0xa, 0x4, 0xfa00, {r4}}, 0xc) 07:25:58 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r2, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xcc}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x801}, 0x40080d4) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r2, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xcc}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x801}, 0x40080d4) (async) 07:25:58 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000002800)={0x16, 0x98, 0xfa00, {&(0x7f00000027c0), 0x3, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x9, 0x3, {"9204baf393a5dab29af48a377112a64c"}, 0x8, 0x7fffffffffffffff, 0x9}}}, 0xa0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f00000000c0)=@pppoe, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/231, 0xe7}, {&(0x7f0000000240)=""/185, 0xb9}, {&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/28, 0x1c}, {&(0x7f0000001400)=""/74, 0x4a}, {&(0x7f0000001480)=""/241, 0xf1}, {&(0x7f0000001580)=""/63, 0x3f}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x9, &(0x7f0000002680)=""/203, 0xcb}, 0x20000002) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f00000028c0)=0x2bc, 0x4) accept$inet(r1, 0x0, &(0x7f0000000080)) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r1, 0xffffe772}}, 0x10) 07:25:58 executing program 1: clock_gettime(0x7, &(0x7f0000000040)) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480), 0x2, 0x6}}, 0x20) 07:25:58 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x3) (async, rerun: 32) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (rerun: 32) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async, rerun: 64) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (rerun: 64) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r2, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0xcc}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00'}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x801}, 0x40080d4) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r1, 0xffffe772}}, 0x10) 07:25:58 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async, rerun: 32) r2 = socket$inet_udp(0x2, 0x2, 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0xfff}}, './file0\x00'}) (async, rerun: 64) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x8002, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0x101, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async, rerun: 64) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) (rerun: 64) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080)=0xffffffffffffffff, 0x12) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r6, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x3, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x2, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r5, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 32) sendmsg$nl_route(r5, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[@ANYBLOB="f40000001800010025bd7000fcdbdf250a008006fe02fd0b00000000050014000300000005001400d40000000c00090005000009", @ANYRES32=r7, @ANYBLOB="1200088067ab4dd94183642d1dbd27e368ad00001400050000000000000000000000ffff0a01010285000880d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce30000000c000900faff0207", @ANYRES32=0x0, @ANYBLOB="63a14d20126a57dee003b8afbda8e21e94f9d95d9a3469fb67251ebcc16c2f6e3bc1bd29c45679092cd823cca00c29000000ef09af55daf61ad5fd762805911795d116b515edae35ee6ca7de93ce56fb00"/92], 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r8, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2c0000001600000425bd7000fddbdf250278c4fd", @ANYRES32=r7, @ANYBLOB="1400030067726574617030000000000000000000c2f02514fda59b5fdef4b10d0490320e339c808ed2a080289bb78cce7a5d656440b3d3360d77dfa243eb5ab49647aab6ccf40de5ca39cd5083d9f256537e37e6d7ff29109431cffdce8ac51eac1cd4dc0c9cc6fdd7a0f38c087f9f6433be880653a7bfa739a5e60ccb78d794aab5342345ad25c9e5a42f47081277d34a7ad5ef8f4f4cafc70d2cf74db57f3a6c8135965ff76401bd506060b52e69b7f7f47a773a643a6a502d09ed6d9bba2019f088ecee53a9face8d114be74d4abe35b1955d56c5add37d1f131c95d6610387"], 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) (async) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x38c, 0x0, 0x421, 0x70bd2e, 0x25dfdbfd, {}, [{{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb509}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2300acbc}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x345}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x19aae890}}, {0x8, 0x6, r7}}}]}}]}, 0x38c}}, 0x4040) 07:25:58 executing program 1: clock_gettime(0x7, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f0000000040)) (async) 07:25:58 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000002800)={0x16, 0x98, 0xfa00, {&(0x7f00000027c0), 0x3, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x9, 0x3, {"9204baf393a5dab29af48a377112a64c"}, 0x8, 0x7fffffffffffffff, 0x9}}}, 0xa0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f00000000c0)=@pppoe, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/231, 0xe7}, {&(0x7f0000000240)=""/185, 0xb9}, {&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/28, 0x1c}, {&(0x7f0000001400)=""/74, 0x4a}, {&(0x7f0000001480)=""/241, 0xf1}, {&(0x7f0000001580)=""/63, 0x3f}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x9, &(0x7f0000002680)=""/203, 0xcb}, 0x20000002) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f00000028c0)=0x2bc, 0x4) accept$inet(r1, 0x0, &(0x7f0000000080)) socket$l2tp(0x2, 0x2, 0x73) (async) accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10) (async) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000002800)={0x16, 0x98, 0xfa00, {&(0x7f00000027c0), 0x3, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x9, 0x3, {"9204baf393a5dab29af48a377112a64c"}, 0x8, 0x7fffffffffffffff, 0x9}}}, 0xa0) (async) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f00000000c0)=@pppoe, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/231, 0xe7}, {&(0x7f0000000240)=""/185, 0xb9}, {&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/28, 0x1c}, {&(0x7f0000001400)=""/74, 0x4a}, {&(0x7f0000001480)=""/241, 0xf1}, {&(0x7f0000001580)=""/63, 0x3f}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x9, &(0x7f0000002680)=""/203, 0xcb}, 0x20000002) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f00000028c0)=0x2bc, 0x4) (async) accept$inet(r1, 0x0, &(0x7f0000000080)) (async) 07:25:58 executing program 1: clock_gettime(0x7, &(0x7f0000000040)) 07:25:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480), 0x2, 0x6}}, 0x20) 07:25:58 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000002800)={0x16, 0x98, 0xfa00, {&(0x7f00000027c0), 0x3, 0xffffffffffffffff, 0x1c, 0x1, @ib={0x1b, 0x9, 0x3, {"9204baf393a5dab29af48a377112a64c"}, 0x8, 0x7fffffffffffffff, 0x9}}}, 0xa0) (async) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f00000000c0)=@pppoe, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000140)=""/231, 0xe7}, {&(0x7f0000000240)=""/185, 0xb9}, {&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/28, 0x1c}, {&(0x7f0000001400)=""/74, 0x4a}, {&(0x7f0000001480)=""/241, 0xf1}, {&(0x7f0000001580)=""/63, 0x3f}, {&(0x7f00000015c0)=""/4096, 0x1000}], 0x9, &(0x7f0000002680)=""/203, 0xcb}, 0x20000002) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f00000028c0)=0x2bc, 0x4) accept$inet(r1, 0x0, &(0x7f0000000080)) 07:25:58 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)}, 0x10) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r6}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r6, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000400)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r6, 0x1}}, 0x18) 07:25:59 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x1, &(0x7f0000000040)) 07:25:59 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xfffffffffffffd8f) 07:25:59 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x9, 0x4c8, 0x5, {}, {0x77359400}, {0x0, 0x1, 0x1}, 0x1, @can={{0x3}, 0x2, 0x1, 0x0, 0x0, "e1c3cbab53735377"}}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x800) r1 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x1) 07:25:59 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x82600, 0x0) socket$can_raw(0x1d, 0x3, 0x1) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x800) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000240), r1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480), 0x2, 0x6}}, 0x20) 07:25:59 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x9, 0x4c8, 0x5, {}, {0x77359400}, {0x0, 0x1, 0x1}, 0x1, @can={{0x3}, 0x2, 0x1, 0x0, 0x0, "e1c3cbab53735377"}}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x800) r1 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x1) 07:25:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "7f857db48db4cf7e1fe2ed22c2053525e6d1c77a27a0634078a91c97a170ea8ef63848a54f29f0e99a3a20096604d556bf56ac1b3c9bdd8b5b93ca33d84dcecf72f5e2af3d1a1710097661ee07afd8ff44fb9456b9238c6de928a826a008fa47da5c38c2c6826c5e501c4f3c0263f592f69ad59956453551286c00c6743b2c4727ef94bcbbb38ecd177691a52df2b8edbf73f1e1cac586c55eb1b957696838013825cc87607c9f08a8eb8b1681adc3071d21295e3df0bf215fc9de7427307a6e98fee58971369a0447a82903f0213ccb29c3a96cec4f365cad9083812d84785d847d225c804c874c0fb207b63f7f0218884c15f207bf68bf60ec460d5be4e4fb"}, r1}}, 0x128) (async) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)}, 0x10) (async) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r6}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r6, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000400)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r6, 0x1}}, 0x18) 07:25:59 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xfffffffffffffd8f) 07:25:59 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (async) clock_gettime(0x1, &(0x7f0000000040)) 07:25:59 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xfffffffffffffd8f) socket$l2tp(0x2, 0x2, 0x73) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0xfffffffffffffd8f) (async) 07:25:59 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x82600, 0x0) socket$can_raw(0x1d, 0x3, 0x1) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x800) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) socket$l2tp(0x2, 0x2, 0x73) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x82600, 0x0) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x800) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) (async) 07:25:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480), 0x2, 0x6}}, 0x20) 07:25:59 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_gettime(0x1, &(0x7f0000000040)) clock_gettime(0x6, &(0x7f0000000000)) (async) clock_gettime(0x1, &(0x7f0000000040)) (async) 07:25:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)}, 0x10) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r6}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r6, 0x9}}, 0x10) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000400)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r6, 0x1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0xfff}}, './file0\x00'}) (async) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r2, 0x58, &(0x7f0000000640)}, 0x10) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000940)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000900), 0x13f, 0x3}}, 0x20) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000980)={0x1, 0x10, 0xfa00, {&(0x7f00000008c0), r6}}, 0x18) (async) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000b80)={0x4, 0x8, 0xfa00, {r6, 0x9}}, 0x10) (async) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000400)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r6, 0x1}}, 0x18) (async) 07:25:59 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x9, 0x4c8, 0x5, {}, {0x77359400}, {0x0, 0x1, 0x1}, 0x1, @can={{0x3}, 0x2, 0x1, 0x0, 0x0, "e1c3cbab53735377"}}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x800) r1 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x1) 07:25:59 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x0) 07:25:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480), 0x2, 0x6}}, 0x20) 07:25:59 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x82600, 0x0) (async) socket$can_raw(0x1d, 0x3, 0x1) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x800) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:59 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) clock_getres(0x1, &(0x7f0000000040)) 07:25:59 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010086000100000018000000", @ANYRES32=r2, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r6, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r7, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r6, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r8}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r9, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r8}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f0000000140)={0x390, 0x0, 0x10, 0x70bd29, 0x25dfdbfd, {}, [{{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8d}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x140, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2295}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x18c9bd5}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}]}, 0x390}, 0x1, 0x0, 0x0, 0x1}, 0x0) 07:25:59 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x80000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x4, &(0x7f0000000280)={0x1000000, 'wlan0\x00'}, 0x18) 07:25:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vxcan1\x00'}) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) 07:25:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480), 0x2, 0x6}}, 0x20) 07:25:59 executing program 1: clock_gettime(0x6, &(0x7f0000000000)) (async) clock_getres(0x1, &(0x7f0000000040)) 07:25:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vxcan1\x00'}) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000200)={'vxcan1\x00'}) (async) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}, r1}}, 0x128) (async) 07:25:59 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010086000100000018000000", @ANYRES32=r2, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r3}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) (async) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r6, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r7, {0xfff}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r6, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r8}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r9, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)=@ipv4_getaddr={0x2c, 0x16, 0x400, 0x70bd25, 0x25dfdbfd, {0x2, 0x78, 0xc4, 0xfd, r8}, [@IFA_LABEL={0x14, 0x3, 'gretap0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044840}, 0x4000) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f0000000140)={0x390, 0x0, 0x10, 0x70bd29, 0x25dfdbfd, {}, [{{0x8}, {0x134, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8d}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3f8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x140, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2295}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x18c9bd5}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}]}, 0x390}, 0x1, 0x0, 0x0, 0x1}, 0x0) 07:25:59 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, 0x0, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, 0x0, 0x0) (async) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000880)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) (async) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x3, 0x0, 0x0) (async) 07:25:59 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x3, 0x0, 0x29) (async) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)=ANY=[@ANYBLOB="010086000100000018000000", @ANYRES32=r2, @ANYBLOB="ff0f0000000000002e2f66696c653000"]) (async, rerun: 64) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000240)=[{0x5, 0x0, [0xffffff7f, 0x401, 0x6, 0x0, 0x5, 0x7fff, 0x7fffffff, 0xfffffffe, 0x7cfded36, 0x31, 0x3f, 0x8, 0x2, 0x3, 0x81, 0x2]}, {0x0, 0x0, [0x3f, 0x1, 0x0, 0x5, 0x8, 0x4, 0x81, 0xfffffff8, 0x9, 0x5, 0x9, 0x0, 0x4, 0x80000000, 0x1, 0x8000]}, {0x3a, 0x0, [0x7fc00000, 0x8, 0x90c5, 0x100, 0x100, 0x3, 0xfffffff8, 0x5, 0x1, 0x0, 0x3, 0x4, 0x4, 0x8, 0xffff7fff, 0xd972da0]}, {0x0, 0x0, [0xc0000000, 0x2, 0xc22b, 0x1000, 0xfffffffa, 0x2a11, 0x3, 0x124f00b7, 0x1, 0x7, 0x5, 0x5, 0x8, 0x1f, 0x80, 0x100]}, {0x10, 0x0, [0x7fffffff, 0x4, 0x3, 0x2, 0x66e, 0x4, 0xffff, 0xfffffffe, 0x1, 0x219, 0x5fa, 0x1, 0x8, 0x0, 0xfffffff7, 0x4]}, {0x1, 0x0, [0x101, 0x2, 0x9, 0x3, 0xffff, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0xffffffff, 0x4, 0x15728e3c, 0x904a117d, 0x59]}, {0x8, 0x0, [0xbd8e, 0x3, 0x7f, 0x80, 0x0, 0x264, 0x6f, 0x0, 0x2, 0xfff, 0x3f, 0x0, 0x2, 0x9, 0x6, 0xfff]}, {0x2, 0x0, [0x401, 0x7, 0x1, 0x2, 0x7, 0x2, 0x5d, 0x7, 0x8, 0x40, 0x6, 0x3ff, 0x8000, 0x10000, 0x1, 0x8a]}, {0xb, 0x0, [0x0, 0x80000001, 0x3, 0x6, 0x2, 0x5, 0x9, 0x6, 0xc000000, 0x6, 0x1, 0x81, 0xbf4, 0x91cf, 0x5a21, 0x1]}, {0x0, 0x0, [0x4, 0x9, 0x100, 0x9, 0x89, 0xacb, 0x7fffffff, 0x80, 0x0, 0x3, 0x5, 0x1, 0x2, 0x0, 0x35480, 0x6]}], 0xffffffffffffffff, 0x1, 0x1, 0x2d0}}, 0x20) (rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000800)={&(0x7f0000000700)=@ipv6_newroute={0xf4, 0x18, 0x1, 0x70bd25, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x6, 0xfe, 0x2, 0xfd, 0xb}, [@RTA_PREF={0x5, 0x14, 0x3}, @RTA_PREF={0x5, 0x14, 0xd4}, @RTA_MULTIPATH={0xc, 0x9, {0x5, 0x0, 0x9, r3}}, @RTA_METRICS={0x12, 0x8, 0x0, 0x1, "67ab4dd94183642d1dbd27e368ad"}, @RTA_GATEWAY={0x14, 0x5, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @RTA_METRICS={0x85, 0x8, 0x0, 0x1, "d089007eb1da6938181ecb6f5e4cddf0a2fada087b366ef3dc4b3cfb1724421fa7aed838100cd117051efa896ed779dd0658fb4f6aa38b4db18c056857d768d2800133a74ee73e313848e5221f1a3ac6f7145a508b3514a6a963c01857bf5c7d65e6a4e1f57cde5c18fdf0a1417ccad6ac66f11c5690a83daf80777f2a92dafce3"}, @RTA_MULTIPATH={0xc, 0x9, {0xfffa, 0x2, 0x7}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) (async) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r4, &(0x7f0000000d80)={&(0x7f0000000cc0)