1278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:24 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2a", 0x60, 0x80000001}]) [ 389.601715] loop4: unable to read partition table [ 389.618922] loop4: partition table beyond EOD, truncated 04:29:24 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 389.652163] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:24 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}]) [ 389.870853] loop3: unable to read partition table [ 389.879033] loop3: partition table beyond EOD, truncated [ 389.892549] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:29:25 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {0x0, 0x0, 0x1fa9}]) 04:29:25 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e", 0x48, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 389.986854] loop1: unable to read partition table [ 389.999951] loop1: partition table beyond EOD, truncated [ 390.008424] loop5: [POWERTEC] 04:29:25 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2a", 0x60, 0x80000001}]) 04:29:25 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 390.082252] loop1: unable to read partition table [ 390.087603] loop1: partition table beyond EOD, truncated [ 390.110756] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:29:25 executing program 1: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:25 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}]) [ 390.271276] loop4: unable to read partition table [ 390.291652] loop4: partition table beyond EOD, truncated [ 390.312695] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 390.349975] loop3: unable to read partition table [ 390.362687] loop3: partition table beyond EOD, truncated [ 390.370170] loop3: unable to read partition table [ 390.378539] loop3: partition table beyond EOD, truncated [ 390.384012] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:29:25 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e", 0x48, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 390.586176] loop5: [POWERTEC] 04:29:25 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {0x0, 0x0, 0x1fa9}]) 04:29:25 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}]) 04:29:25 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:25 executing program 1: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:25 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b", 0x64, 0x80000001}]) [ 390.812623] loop4: unable to read partition table [ 390.818115] loop4: partition table beyond EOD, truncated [ 390.832177] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 390.840699] loop4: unable to read partition table [ 390.852162] loop4: partition table beyond EOD, truncated [ 390.906782] loop3: unable to read partition table [ 390.911962] loop3: partition table beyond EOD, truncated [ 390.919632] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:29:26 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b", 0x64, 0x80000001}]) 04:29:26 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113", 0x4d, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:26 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}]) 04:29:26 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {0x0, 0x0, 0x1fa9}]) [ 391.148658] loop5: [POWERTEC] 04:29:26 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba3", 0x7}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:26 executing program 1: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:26 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba3", 0x7}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:26 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b", 0x64, 0x80000001}]) [ 391.448945] loop4: unable to read partition table [ 391.454065] loop4: partition table beyond EOD, truncated [ 391.462660] loop3: unable to read partition table [ 391.472256] loop3: partition table beyond EOD, truncated [ 391.481406] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 391.498460] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 391.542938] loop0: unable to read partition table [ 391.548396] loop0: partition table beyond EOD, truncated [ 391.554020] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:29:26 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:26 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0}]) 04:29:26 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113", 0x4d, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:27 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {0x0, 0x0, 0x1fa9}]) 04:29:27 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66, 0x80000001}]) [ 391.997559] loop4: unable to read partition table [ 392.005669] loop4: partition table beyond EOD, truncated [ 392.021066] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:27 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba3", 0x7}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:27 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0}]) 04:29:27 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113", 0x4d, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 392.146193] loop3: unable to read partition table [ 392.154893] loop3: partition table beyond EOD, truncated [ 392.176534] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:29:27 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa", 0x58}, {0x0, 0x0, 0x1fa9}]) 04:29:27 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:27 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b4", 0xa}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:27 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66, 0x80000001}]) 04:29:27 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0}]) 04:29:27 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 392.676903] loop3: unable to read partition table [ 392.682736] loop4: unable to read partition table [ 392.704490] loop3: partition table beyond EOD, truncated [ 392.709577] loop4: partition table beyond EOD, truncated [ 392.727064] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 392.729539] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:29:28 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66, 0x80000001}]) 04:29:28 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa", 0x58}, {0x0, 0x0, 0x1fa9}]) 04:29:28 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6a", 0x65, 0x80000001}]) 04:29:28 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b4", 0xa}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:28 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f81431", 0x50, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:28 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 393.186389] loop3: unable to read partition table [ 393.191421] loop3: partition table beyond EOD, truncated [ 393.203825] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:29:28 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa", 0x58}, {0x0, 0x0, 0x1fa9}]) 04:29:28 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6a", 0x65, 0x80000001}]) 04:29:28 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66, 0x80000001}]) [ 393.416745] loop4: unable to read partition table [ 393.425576] loop4: partition table beyond EOD, truncated [ 393.431364] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:28 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b4", 0xa}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:28 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f81431", 0x50, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:28 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 393.688646] loop3: unable to read partition table [ 393.699073] loop3: partition table beyond EOD, truncated [ 393.722762] loop3: unable to read partition table [ 393.728843] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 393.730755] loop3: partition table beyond EOD, truncated 04:29:29 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499", 0xb}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:29 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6a", 0x65, 0x80000001}]) 04:29:29 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66, 0x80000001}]) 04:29:29 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:29 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 394.209804] loop4: unable to read partition table 04:29:29 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66}]) 04:29:29 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499", 0xb}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 394.247134] loop4: partition table beyond EOD, truncated [ 394.285833] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:29 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:29 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f81431", 0x50, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 394.508577] loop2: unable to read partition table [ 394.515048] loop2: partition table beyond EOD, truncated [ 394.528977] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:29:29 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) 04:29:29 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66}]) 04:29:30 executing program 1: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:30 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499", 0xb}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:30 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:30 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) [ 394.919853] loop4: unable to read partition table [ 394.925063] loop4: partition table beyond EOD, truncated [ 394.931846] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 394.952595] loop2: unable to read partition table [ 394.959019] loop2: partition table beyond EOD, truncated [ 394.972346] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:29:30 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:30 executing program 1: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:30 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:29:30 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66}]) 04:29:30 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499", 0xb}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:30 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) 04:29:30 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) [ 395.418613] loop2: unable to read partition table [ 395.426152] loop2: partition table beyond EOD, truncated [ 395.444596] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 395.501513] loop4: unable to read partition table [ 395.507479] loop4: partition table beyond EOD, truncated [ 395.513245] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:30 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:30 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66, 0x80000001}]) 04:29:30 executing program 1: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:30 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:30 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499", 0xb}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 395.758935] loop4: unable to read partition table [ 395.764098] loop4: partition table beyond EOD, truncated [ 395.771614] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:31 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) 04:29:31 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:31 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:29:31 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:31 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499", 0xb}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:31 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 396.396140] loop0: unable to read partition table [ 396.401585] loop0: partition table beyond EOD, truncated [ 396.416217] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:29:31 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) 04:29:31 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) 04:29:31 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) [ 396.523115] loop4: unable to read partition table [ 396.531953] loop4: partition table beyond EOD, truncated [ 396.544619] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:32 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:32 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 04:29:32 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 396.797578] loop0: unable to read partition table [ 396.824453] loop0: partition table beyond EOD, truncated [ 396.855762] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:29:32 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) 04:29:32 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) 04:29:32 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:32 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:32 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:32 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 397.375278] loop0: unable to read partition table [ 397.383489] loop0: partition table beyond EOD, truncated [ 397.390871] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 397.480147] loop5: unable to read partition table [ 397.485245] loop5: partition table beyond EOD, truncated [ 397.491706] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:32 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:29:32 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) 04:29:32 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:32 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:32 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 397.876895] loop5: unable to read partition table [ 397.883260] loop5: partition table beyond EOD, truncated [ 397.889239] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:33 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) 04:29:33 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:29:33 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:33 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:33 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0}]) 04:29:33 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:33 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) 04:29:33 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) [ 398.352252] loop5: unable to read partition table [ 398.357801] loop5: partition table beyond EOD, truncated [ 398.363856] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:33 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:33 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 398.530915] loop0: unable to read partition table [ 398.536546] loop4: unable to read partition table [ 398.538412] loop0: partition table beyond EOD, truncated [ 398.542073] loop4: partition table beyond EOD, truncated 04:29:33 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) [ 398.595321] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 398.599776] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:34 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:34 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0}]) [ 398.776562] loop5: unable to read partition table [ 398.792092] loop5: partition table beyond EOD, truncated [ 398.820823] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:34 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362", 0x33, 0x80000001}]) 04:29:34 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) 04:29:34 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:34 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 399.127159] loop0: unable to read partition table [ 399.132352] loop0: partition table beyond EOD, truncated [ 399.138468] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 399.167090] loop4: unable to read partition table [ 399.172684] loop4: partition table beyond EOD, truncated [ 399.191626] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 399.266905] loop5: unable to read partition table [ 399.272450] loop5: partition table beyond EOD, truncated [ 399.279739] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 399.290127] loop5: unable to read partition table [ 399.295213] loop5: partition table beyond EOD, truncated 04:29:34 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:34 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0}]) 04:29:34 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) 04:29:34 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362", 0x33, 0x80000001}]) 04:29:34 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 399.527469] loop4: unable to read partition table 04:29:34 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 399.568467] loop4: partition table beyond EOD, truncated [ 399.592955] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 399.610643] loop5: unable to read partition table 04:29:34 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 399.620535] loop5: partition table beyond EOD, truncated [ 399.630567] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:34 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 399.730794] loop0: unable to read partition table [ 399.747022] loop0: partition table beyond EOD, truncated [ 399.754079] loop0: unable to read partition table [ 399.759336] loop0: partition table beyond EOD, truncated [ 399.764829] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:29:35 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:35 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:35 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362", 0x33, 0x80000001}]) 04:29:35 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:35 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0}]) [ 400.059768] loop4: unable to read partition table [ 400.075237] loop4: partition table beyond EOD, truncated [ 400.112241] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:35 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:35 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61", 0x4d, 0x80000001}]) 04:29:35 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:35 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d58", 0x43}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:35 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:35 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0}]) [ 400.716210] loop4: unable to read partition table [ 400.727702] loop4: partition table beyond EOD, truncated [ 400.738755] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:36 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:29:36 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:36 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61", 0x4d, 0x80000001}]) 04:29:36 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d58", 0x43}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 401.009433] loop4: unable to read partition table [ 401.014586] loop4: partition table beyond EOD, truncated [ 401.021357] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:36 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0}]) 04:29:36 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:29:36 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:36 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:36 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:36 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d58", 0x43}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 401.463348] loop4: unable to read partition table [ 401.471994] loop4: partition table beyond EOD, truncated [ 401.480927] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:36 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:29:36 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:36 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:29:37 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:37 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:37 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:37 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 402.007629] loop4: unable to read partition table [ 402.012899] loop4: partition table beyond EOD, truncated [ 402.019269] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:37 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:37 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:37 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:37 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:37 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:37 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:37 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:37 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:37 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:37 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f8", 0x41, 0x80000001}]) [ 402.807044] loop5: unable to read partition table [ 402.812292] loop5: partition table beyond EOD, truncated [ 402.818774] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:38 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:38 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:38 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f8", 0x41, 0x80000001}]) 04:29:38 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:29:38 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 403.213693] loop5: unable to read partition table [ 403.224432] loop5: partition table beyond EOD, truncated [ 403.232052] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:38 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:38 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:38 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:29:38 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:29:38 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d4", 0x35, 0x80000001}]) 04:29:39 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:29:39 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:39 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:39 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:29:39 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) 04:29:39 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d4", 0x35, 0x80000001}]) 04:29:39 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{0x0}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:39 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:29:39 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:39 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) 04:29:39 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:39 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802", 0x29, 0x80000001}]) 04:29:39 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{0x0}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:39 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:29:40 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:40 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) 04:29:40 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247a", 0x4f}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:40 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802", 0x29, 0x80000001}]) [ 405.297750] loop5: unable to read partition table [ 405.305347] loop5: partition table beyond EOD, truncated [ 405.325156] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:40 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) 04:29:40 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{0x0}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:40 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:29:40 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:40 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247a", 0x4f}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:40 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802", 0x29, 0x80000001}]) [ 405.729395] loop5: unable to read partition table [ 405.737351] loop5: partition table beyond EOD, truncated [ 405.745038] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:41 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:41 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) 04:29:41 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247a", 0x4f}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:41 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:29:41 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:41 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad", 0x2f, 0x80000001}]) 04:29:41 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) 04:29:41 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:41 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:41 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:41 executing program 0: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247a", 0x4f}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:41 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad", 0x2f, 0x80000001}]) 04:29:42 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:42 executing program 0: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:42 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:42 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad", 0x2f, 0x80000001}]) 04:29:42 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) 04:29:42 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:42 executing program 0: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:42 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:42 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) 04:29:42 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad793613", 0x32, 0x80000001}]) 04:29:42 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:42 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:29:42 executing program 0: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:43 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:43 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) [ 407.971171] loop5: unable to read partition table [ 407.976748] loop5: partition table beyond EOD, truncated [ 407.988157] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:43 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a19", 0x53}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:43 executing program 0: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:29:43 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad793613", 0x32, 0x80000001}]) 04:29:43 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:43 executing program 5: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:43 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a19", 0x53}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:43 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad793613", 0x32, 0x80000001}]) 04:29:44 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:44 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:29:44 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:29:44 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) 04:29:44 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a19", 0x53}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 409.207047] loop3: [POWERTEC] 04:29:44 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:44 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:44 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:29:44 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:29:44 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 409.648920] loop3: [POWERTEC] 04:29:44 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:29:45 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:29:45 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:45 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) 04:29:45 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:29:45 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:45 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:45 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a", 0x17}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 410.190655] loop3: [POWERTEC] 04:29:45 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) 04:29:45 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:29:45 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:45 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:29:45 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a", 0x17}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:45 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:29:46 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362", 0x33, 0x80000001}]) 04:29:46 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:29:46 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) 04:29:46 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 04:29:46 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a", 0x17}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:46 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:29:46 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:29:46 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}]) 04:29:46 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362", 0x33, 0x80000001}]) 04:29:46 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 04:29:46 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f12", 0x22}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 411.567863] loop0: unable to read partition table [ 411.575174] loop0: partition table beyond EOD, truncated [ 411.582016] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:29:47 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:29:47 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}]) 04:29:47 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a", 0x17}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:47 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362", 0x33, 0x80000001}]) 04:29:47 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 04:29:47 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f12", 0x22}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 412.057645] loop0: unable to read partition table 04:29:47 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) [ 412.081942] loop0: partition table beyond EOD, truncated [ 412.106622] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:29:47 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f12", 0x22}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:47 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}]) 04:29:47 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f12", 0x22}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:47 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34}]) 04:29:47 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) [ 412.603224] loop0: unable to read partition table [ 412.618606] loop0: partition table beyond EOD, truncated 04:29:47 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:29:47 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}]) [ 412.666137] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:29:48 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) [ 413.058031] loop5: unable to read partition table [ 413.063271] loop5: partition table beyond EOD, truncated [ 413.069107] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:29:48 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34}]) 04:29:48 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd", 0x28}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:48 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}]) 04:29:48 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362", 0x33, 0x80000001}]) 04:29:48 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {0x0}]) 04:29:48 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0, 0x0, 0x80000001}]) [ 413.368020] loop1: unable to read partition table [ 413.380937] loop1: partition table beyond EOD, truncated [ 413.392302] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:29:48 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:29:48 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34}]) 04:29:48 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd", 0x28}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 413.658013] loop0: unable to read partition table [ 413.663162] loop0: partition table beyond EOD, truncated [ 413.669251] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:29:48 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd", 0x28}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:49 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0, 0x0, 0x80000001}]) 04:29:49 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {0x0}]) 04:29:49 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {0x0}]) 04:29:49 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) [ 414.156226] loop0: unable to read partition table [ 414.162490] loop0: partition table beyond EOD, truncated [ 414.169127] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 414.190802] loop1: unable to read partition table [ 414.199884] loop1: partition table beyond EOD, truncated 04:29:49 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd", 0x28}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:49 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd", 0x28}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 414.211150] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:29:49 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0}]) 04:29:49 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0, 0x0, 0x80000001}]) 04:29:49 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0, 0x0, 0x80000001}]) 04:29:49 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:49 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40", 0x2b}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 414.581285] loop4: [POWERTEC] 04:29:49 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0, 0x0, 0x80000001}]) 04:29:49 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd", 0x28}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:49 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0, 0x0, 0x80000001}]) 04:29:50 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:50 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0}]) 04:29:50 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e", 0x29}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:50 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40", 0x2b}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 415.018725] loop4: [POWERTEC] 04:29:50 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:50 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:29:50 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:50 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0}]) 04:29:50 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e", 0x29}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:50 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:50 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:50 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e", 0x29}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:50 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:29:51 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0}, {0x0}]) 04:29:51 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:51 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:51 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e", 0x29}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:51 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:29:51 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:29:51 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0}, {0x0}]) 04:29:52 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a", 0x2a}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:52 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0}, {0x0}]) 04:29:52 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0}]) 04:29:52 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:52 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0}, {0x0}]) 04:29:52 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:52 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a", 0x2a}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:52 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a", 0x2a}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:52 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:52 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {0x0}]) 04:29:52 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:52 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:52 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a", 0x2a}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:52 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0, 0x0, 0x80000001}]) [ 417.623439] loop0: unable to read partition table [ 417.632109] loop0: partition table beyond EOD, truncated [ 417.663271] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:29:53 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e", 0x29}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:53 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a", 0x2a}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:53 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) [ 417.975469] loop5: [POWERTEC] 04:29:53 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0}]) 04:29:53 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0, 0x0, 0x80000001}]) 04:29:53 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd", 0x28}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:53 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {0x0}]) 04:29:53 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {0x0}]) 04:29:53 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0}]) 04:29:53 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd", 0x28}, {0x0}, {0x0, 0x0, 0x80000001}]) [ 418.395285] loop5: [POWERTEC] 04:29:53 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:53 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0, 0x0, 0x80000001}]) [ 418.598845] loop1: unable to read partition table [ 418.603976] loop1: partition table beyond EOD, truncated [ 418.610612] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 418.621552] loop4: unable to read partition table [ 418.626830] loop4: partition table beyond EOD, truncated [ 418.634452] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:29:53 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34}]) 04:29:53 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0}]) 04:29:54 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd", 0x28}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:54 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) [ 418.845785] loop5: [POWERTEC] 04:29:54 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd", 0x28}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:54 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:54 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:54 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 04:29:54 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0}]) 04:29:54 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:29:54 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:54 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:54 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:29:55 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a", 0x52}, {0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:29:55 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:55 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 04:29:55 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d58", 0x43}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:55 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:55 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:55 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}]) 04:29:55 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 04:29:55 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:55 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:55 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d58", 0x43}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:55 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:56 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}]) 04:29:56 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) [ 420.903807] loop4: [POWERTEC] 04:29:56 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d58", 0x43}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:56 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:56 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad793613", 0x32, 0x80000001}]) 04:29:56 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}]) 04:29:56 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:56 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a19", 0x53}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 421.387376] loop4: [POWERTEC] 04:29:56 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:56 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:56 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:56 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:29:56 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a19", 0x53}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:29:57 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:57 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) [ 421.881639] loop4: [POWERTEC] 04:29:57 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:57 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:29:57 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad", 0x2f, 0x80000001}]) 04:29:57 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) 04:29:57 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802", 0x29, 0x80000001}]) 04:29:57 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) 04:29:58 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 04:29:58 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{0x0}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:58 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:58 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) 04:29:58 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:29:58 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:58 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:58 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:29:58 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:58 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802", 0x29, 0x80000001}]) 04:29:58 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:29:58 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:29:58 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:29:58 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:29:58 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{0x0}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:59 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:59 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:59 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:29:59 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:29:59 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:29:59 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{0x0}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:29:59 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:29:59 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:29:59 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:29:59 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {0x0}]) 04:29:59 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:30:00 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) 04:30:00 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {0x0}]) 04:30:00 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802", 0x29, 0x80000001}]) 04:30:00 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:00 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:00 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:30:00 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) 04:30:00 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:30:00 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:00 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {0x0}]) 04:30:00 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:00 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:00 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{0x0}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:30:01 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:01 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:01 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:01 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0, 0x0, 0x80000001}]) 04:30:01 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {0x0}]) 04:30:01 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 426.217374] loop4: [POWERTEC] 04:30:01 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa", 0x58}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:01 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:01 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:01 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:30:01 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:30:01 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:01 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:30:01 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:01 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa", 0x58}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:02 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:30:02 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:30:02 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:02 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:30:02 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:30:02 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa", 0x58}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:02 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa", 0x58}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:02 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:30:02 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:30:02 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa", 0x58}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2", 0x34, 0x80000001}]) 04:30:02 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:30:03 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}]) 04:30:03 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:03 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:30:03 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:03 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:30:03 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:30:03 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x80000001}]) 04:30:03 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:30:03 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:03 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:03 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:04 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:30:04 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:30:04 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:30:04 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d58", 0x43}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:04 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) 04:30:04 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 429.355916] loop2: unable to read partition table [ 429.361258] loop2: partition table beyond EOD, truncated [ 429.370595] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:30:04 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:04 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x80000001}]) 04:30:04 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0}]) 04:30:04 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d58", 0x43}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:04 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 429.559938] loop0: unable to read partition table [ 429.573061] loop0: partition table beyond EOD, truncated [ 429.593725] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:30:05 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:30:05 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0}]) 04:30:05 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:05 executing program 5: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:05 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) [ 430.088029] loop2: unable to read partition table [ 430.093569] loop2: partition table beyond EOD, truncated [ 430.099610] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:30:05 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:05 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {0x0, 0x0, 0x80000001}]) 04:30:05 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:05 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) 04:30:05 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0}]) 04:30:05 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) [ 430.627601] loop0: unable to read partition table [ 430.632713] loop0: partition table beyond EOD, truncated [ 430.670260] loop3: unable to read partition table [ 430.675491] loop3: partition table beyond EOD, truncated [ 430.683069] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:30:05 executing program 2: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 430.750902] loop0: unable to read partition table [ 430.766442] loop0: partition table beyond EOD, truncated [ 430.767131] loop5: unable to read partition table [ 430.772178] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 430.777262] loop5: partition table beyond EOD, truncated [ 430.790486] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:30:06 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:06 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:30:06 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x80000001}]) 04:30:06 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0}]) 04:30:06 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:06 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:06 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:06 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) [ 431.417323] loop3: unable to read partition table [ 431.422545] loop3: partition table beyond EOD, truncated [ 431.429862] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:30:06 executing program 2: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:06 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) 04:30:07 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 04:30:07 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:07 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:30:07 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:07 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:30:07 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x80000001}]) 04:30:07 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f8143128", 0x51, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:07 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:30:07 executing program 0: syz_read_part_table(0x0, 0x0, 0x0) 04:30:07 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 04:30:07 executing program 4: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:07 executing program 5: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 432.729301] loop3: unable to read partition table [ 432.735046] loop3: partition table beyond EOD, truncated [ 432.741261] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:30:08 executing program 0: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:30:08 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66}]) 04:30:08 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f81431", 0x50, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:08 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 04:30:08 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:08 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa", 0x58}, {0x0, 0x0, 0x1fa9}]) 04:30:08 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499", 0xb}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 433.127362] loop1: unable to read partition table [ 433.152871] loop1: partition table beyond EOD, truncated [ 433.172721] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:30:08 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6a", 0x65, 0x80000001}]) 04:30:08 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b4", 0xa}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:08 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6a", 0x65, 0x80000001}]) [ 433.487548] loop0: unable to read partition table [ 433.493152] loop4: unable to read partition table [ 433.498464] loop4: partition table beyond EOD, truncated [ 433.504158] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 433.505531] loop0: partition table beyond EOD, truncated [ 433.565177] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:30:08 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499", 0xb}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:09 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa", 0x58}, {0x0, 0x0, 0x1fa9}]) 04:30:09 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:09 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae3", 0x66}]) 04:30:09 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113", 0x4d, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:09 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba3", 0x7}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 434.047878] loop4: unable to read partition table [ 434.053635] loop4: partition table beyond EOD, truncated [ 434.060042] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 434.095592] loop0: unable to read partition table [ 434.101078] loop0: partition table beyond EOD, truncated [ 434.108856] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:30:09 executing program 5: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 434.157796] loop1: unable to read partition table [ 434.170486] loop1: partition table beyond EOD, truncated [ 434.183142] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:30:09 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113", 0x4d, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:09 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113", 0x4d, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 434.246698] loop0: unable to read partition table [ 434.251920] loop0: partition table beyond EOD, truncated 04:30:09 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba3", 0x7}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:09 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b", 0x64, 0x80000001}]) 04:30:09 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba3", 0x7}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:09 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {0x0, 0x0, 0x1fa9}]) [ 434.539140] loop0: unable to read partition table [ 434.544177] loop0: partition table beyond EOD, truncated [ 434.552879] loop4: unable to read partition table [ 434.559822] loop4: partition table beyond EOD, truncated [ 434.574779] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 434.583384] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:30:09 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113", 0x4d, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:10 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b", 0x64, 0x80000001}]) 04:30:10 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {0x0, 0x0, 0x1fa9}]) 04:30:10 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba3", 0x7}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:10 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}]) [ 434.962278] loop5: unable to read partition table [ 434.967520] loop5: partition table beyond EOD, truncated [ 434.973011] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 435.000695] loop3: unable to read partition table [ 435.005766] loop3: partition table beyond EOD, truncated [ 435.050948] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:30:10 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {0x0, 0x0, 0x1fa9}]) [ 435.122671] loop4: unable to read partition table [ 435.133943] loop4: partition table beyond EOD, truncated [ 435.141090] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:30:10 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba3", 0x7}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:10 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113", 0x4d, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:10 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b", 0x64, 0x80000001}]) 04:30:10 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e", 0x48, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 435.465092] loop5: unable to read partition table [ 435.473706] loop5: partition table beyond EOD, truncated [ 435.486151] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:30:10 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2", 0x57}, {0x0, 0x0, 0x1fa9}]) 04:30:10 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b", 0x64, 0x80000001}]) 04:30:10 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2a", 0x60, 0x80000001}]) [ 435.787272] loop3: unable to read partition table [ 435.790988] loop4: unable to read partition table [ 435.792380] loop3: partition table beyond EOD, truncated [ 435.800306] loop4: partition table beyond EOD, truncated [ 435.809188] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:30:11 executing program 1: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:11 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 435.843296] loop3: unable to read partition table [ 435.848573] loop3: partition table beyond EOD, truncated [ 435.864868] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 435.918918] loop5: unable to read partition table [ 435.932535] loop5: partition table beyond EOD, truncated [ 435.944818] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:30:11 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {0x0, 0x0, 0x1fa9}]) 04:30:11 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e", 0x48, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 436.296712] loop4: [POWERTEC] 04:30:11 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}]) 04:30:11 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:11 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2a", 0x60, 0x80000001}]) 04:30:11 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e", 0x48, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 436.332795] loop3: unable to read partition table [ 436.338150] loop3: partition table beyond EOD, truncated [ 436.384539] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 436.454393] loop5: unable to read partition table [ 436.459949] loop5: partition table beyond EOD, truncated [ 436.465437] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 436.530986] loop0: [POWERTEC] 04:30:11 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985", 0x54}, {0x0, 0x0, 0x1fa9}]) 04:30:11 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef2914", 0x3e, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:11 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d5", 0xc}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 436.847269] loop4: unable to read partition table [ 436.852996] loop4: partition table beyond EOD, truncated [ 436.861031] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:30:12 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {0x0, 0x0, 0x1fa9}]) [ 436.889743] loop0: unable to read partition table [ 436.901150] loop0: partition table beyond EOD, truncated [ 436.913838] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 436.930985] loop3: unable to read partition table [ 436.937558] loop3: partition table beyond EOD, truncated [ 436.943305] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:30:12 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38b", 0x67, 0x80000001}]) 04:30:12 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 04:30:12 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:12 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {0x0, 0x0, 0x1fa9}]) 04:30:12 executing program 4: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db20000000000000000", 0xe9, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 437.187266] loop2: unable to read partition table [ 437.192440] loop2: partition table beyond EOD, truncated [ 437.201661] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 437.270690] loop2: unable to read partition table [ 437.276141] loop2: partition table beyond EOD, truncated [ 437.317700] loop1: [POWERTEC] 04:30:12 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:12 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {0x0, 0x0, 0x1fa9}]) [ 437.407160] loop3: unable to read partition table [ 437.421106] loop3: partition table beyond EOD, truncated [ 437.434680] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:30:12 executing program 5: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db20000000000000000", 0xe9, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:12 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc", 0x29, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:12 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38b", 0x67, 0x80000001}]) 04:30:12 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf", 0x6e, 0x80000001}]) [ 437.666946] loop1: [POWERTEC] 04:30:12 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6", 0x1}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:13 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc", 0x29, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 437.831437] loop2: unable to read partition table [ 437.836770] loop2: partition table beyond EOD, truncated [ 437.842397] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:30:13 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf", 0x6e, 0x80000001}]) 04:30:13 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a524", 0x4e}, {0x0, 0x0, 0x1fa9}]) [ 437.985510] loop4: unable to read partition table [ 437.998030] loop4: partition table beyond EOD, truncated [ 438.009862] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 438.147510] loop1: [POWERTEC] 04:30:13 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38b", 0x67, 0x80000001}]) 04:30:13 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000", 0xe7, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 438.169557] loop5: unable to read partition table [ 438.174842] loop5: partition table beyond EOD, truncated 04:30:13 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc", 0x29, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 438.235869] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 438.257984] loop2: unable to read partition table [ 438.263304] loop2: partition table beyond EOD, truncated [ 438.277841] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:30:13 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0), 0x0, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:13 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:13 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db20000", 0xe3, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:13 executing program 0: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db20000", 0xe3, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 438.628464] loop4: unable to read partition table [ 438.634044] loop4: partition table beyond EOD, truncated [ 438.640298] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:30:14 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d58", 0x43}, {0x0, 0x0, 0x1fa9}]) 04:30:14 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db20000", 0xe3, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:14 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0), 0x0, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 438.850950] loop2: unable to read partition table [ 438.856663] loop2: partition table beyond EOD, truncated [ 438.870097] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:30:14 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38b", 0x67, 0x80000001}]) 04:30:14 executing program 0: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db20000", 0xe3, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:14 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 439.187736] loop4: unable to read partition table [ 439.192772] loop4: partition table beyond EOD, truncated [ 439.208631] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:30:14 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:14 executing program 4: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f", 0xdc, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 439.278779] loop5: unable to read partition table [ 439.283808] loop5: partition table beyond EOD, truncated [ 439.311396] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:30:14 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0, 0x0, 0x1fa9}]) [ 439.500145] loop1: unable to read partition table [ 439.505309] loop1: partition table beyond EOD, truncated [ 439.511083] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:30:14 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) 04:30:14 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d", 0x58, 0x80000001}]) 04:30:14 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0), 0x0, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:15 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c", 0x2d}, {0x0, 0x0, 0x1fa9}]) 04:30:15 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f", 0xdc, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:15 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 439.900150] loop2: unable to read partition table [ 439.915765] loop2: partition table beyond EOD, truncated [ 439.925406] loop2: unable to read partition table [ 439.931432] loop2: partition table beyond EOD, truncated [ 439.957725] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 440.007273] loop5: unable to read partition table [ 440.012745] loop5: partition table beyond EOD, truncated [ 440.022225] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:30:15 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x1fa9}]) 04:30:15 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d", 0x3b, 0x80000001}]) [ 440.157155] loop4: unable to read partition table [ 440.162389] loop4: partition table beyond EOD, truncated [ 440.168351] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:30:15 executing program 5: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e", 0xcd, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:15 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:15 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:15 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:15 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e", 0xcd, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:15 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0, 0x0, 0x1fa9}]) 04:30:15 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 440.569556] loop1: unable to read partition table [ 440.581757] loop1: partition table beyond EOD, truncated [ 440.593799] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:30:16 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{0x0}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:16 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:16 executing program 0: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695", 0xb0, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:16 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{0x0}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:16 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695", 0xb0, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 440.975778] loop2: unable to read partition table [ 440.983792] loop2: partition table beyond EOD, truncated [ 441.010410] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:30:16 executing program 5: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695", 0xb0, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 441.138316] ieee802154 phy0 wpan0: encryption failed: -22 [ 441.143942] ieee802154 phy1 wpan1: encryption failed: -22 04:30:16 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0}]) 04:30:16 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{0x0}, {0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:16 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {0x0, 0x0, 0x1fa9}]) 04:30:16 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf", 0x75, 0x80000001}]) 04:30:16 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf", 0x75, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:16 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 441.617429] loop2: unable to read partition table [ 441.623575] loop2: partition table beyond EOD, truncated [ 441.636941] loop2: unable to read partition table [ 441.642189] loop2: partition table beyond EOD, truncated [ 441.648238] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:30:17 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:17 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0}]) [ 441.909111] loop5: unable to read partition table [ 441.914730] loop5: partition table beyond EOD, truncated [ 441.921697] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:30:17 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}]) 04:30:17 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:17 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) 04:30:17 executing program 5: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf", 0x75, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:17 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:17 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}]) 04:30:17 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0}]) 04:30:17 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}]) 04:30:17 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 442.457000] loop1: unable to read partition table [ 442.462338] loop1: partition table beyond EOD, truncated [ 442.475432] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:30:17 executing program 4: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140), 0x0, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:17 executing program 1: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) 04:30:18 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 442.787039] loop2: unable to read partition table [ 442.792595] loop2: partition table beyond EOD, truncated [ 442.803040] loop5: unable to read partition table [ 442.804331] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 442.809190] loop5: partition table beyond EOD, truncated [ 442.823033] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:30:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x1fa9}]) 04:30:18 executing program 4: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140), 0x0, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:18 executing program 3: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}]) 04:30:18 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 443.062547] loop1: unable to read partition table [ 443.074786] loop1: partition table beyond EOD, truncated [ 443.090254] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 443.134998] loop2: unable to read partition table [ 443.146107] loop2: partition table beyond EOD, truncated [ 443.153670] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 04:30:18 executing program 1: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) 04:30:18 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 443.277417] loop3: unable to read partition table [ 443.282963] loop3: partition table beyond EOD, truncated [ 443.302294] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:30:18 executing program 4: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140), 0x0, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:18 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0, 0x0, 0x80000001}]) [ 443.437359] loop5: unable to read partition table [ 443.451401] loop5: partition table beyond EOD, truncated 04:30:18 executing program 3: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) [ 443.479259] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:30:18 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140), 0x0, 0x80000001}]) [ 443.558793] loop1: unable to read partition table [ 443.569641] loop1: partition table beyond EOD, truncated [ 443.578776] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:30:18 executing program 1: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0, 0x0, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:19 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:30:19 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:19 executing program 0: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0, 0x0, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 443.806596] loop3: unable to read partition table [ 443.831019] loop3: partition table beyond EOD, truncated [ 443.854385] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:30:19 executing program 1: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {0x0, 0x0, 0x1fa9}]) 04:30:19 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) 04:30:19 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:19 executing program 3: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) 04:30:19 executing program 2: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0, 0x0, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 444.376805] loop3: unable to read partition table [ 444.381953] loop3: partition table beyond EOD, truncated [ 444.391204] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:30:19 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) 04:30:20 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 04:30:20 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)}]) [ 444.771987] loop4: unable to read partition table [ 444.778875] loop1: unable to read partition table [ 444.788382] loop1: partition table beyond EOD, truncated [ 444.807643] loop4: partition table beyond EOD, truncated [ 444.830214] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 444.834888] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:30:20 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}]) 04:30:20 executing program 2: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:20 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) 04:30:20 executing program 1: syz_read_part_table(0x0, 0x0, 0x0) 04:30:20 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) [ 445.116781] loop2: unable to read partition table [ 445.128748] loop2: partition table beyond EOD, truncated [ 445.135724] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 445.177672] loop3: unable to read partition table [ 445.190567] loop3: partition table beyond EOD, truncated [ 445.200853] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 445.211548] loop3: unable to read partition table [ 445.217143] loop3: partition table beyond EOD, truncated [ 445.326879] loop4: unable to read partition table [ 445.334329] loop4: partition table beyond EOD, truncated [ 445.343148] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:30:20 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)}]) 04:30:20 executing program 2: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:20 executing program 3: syz_read_part_table(0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:20 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140), 0x0, 0x80000001}]) 04:30:20 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) [ 445.567175] loop5: unable to read partition table [ 445.572311] loop5: partition table beyond EOD, truncated [ 445.607096] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:30:20 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}]) [ 445.653521] loop1: unable to read partition table [ 445.659348] loop1: partition table beyond EOD, truncated [ 445.664960] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:30:20 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)}]) [ 445.840787] loop2: unable to read partition table [ 445.857855] loop2: partition table beyond EOD, truncated [ 445.863548] loop3: unable to read partition table [ 445.870160] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 445.874209] loop3: partition table beyond EOD, truncated 04:30:21 executing program 4: syz_read_part_table(0x7, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 445.898346] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 04:30:21 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0, 0x0, 0x80000001}]) [ 445.963720] loop5: unable to read partition table [ 445.973214] loop5: partition table beyond EOD, truncated [ 445.984730] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 04:30:21 executing program 3: syz_read_part_table(0x7, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) [ 446.067099] loop1: unable to read partition table [ 446.072217] loop1: partition table beyond EOD, truncated [ 446.081401] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:30:21 executing program 2: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:30:21 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:30:21 executing program 1: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {0x0, 0x0, 0x80000001}]) 04:30:21 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:21 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:21 executing program 4: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:21 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:21 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) 04:30:21 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) getresuid(&(0x7f0000000040), 0x0, &(0x7f00000000c0)) 04:30:22 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:22 executing program 0: getresuid(&(0x7f00000001c0), &(0x7f0000000200), 0x0) 04:30:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 04:30:22 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:22 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:30:22 executing program 2: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:30:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 04:30:22 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) 04:30:22 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:22 executing program 0: getresuid(&(0x7f00000001c0), &(0x7f0000000200), 0x0) 04:30:22 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 04:30:22 executing program 0: getresuid(&(0x7f00000001c0), &(0x7f0000000200), 0x0) 04:30:22 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) 04:30:22 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) 04:30:22 executing program 5: ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) 04:30:22 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:22 executing program 0: getresuid(0x0, &(0x7f0000000200), 0x0) 04:30:22 executing program 4: getresuid(&(0x7f00000001c0), 0x0, &(0x7f0000000240)) 04:30:22 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) 04:30:22 executing program 3: syz_read_part_table(0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:30:22 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:22 executing program 5: ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) 04:30:22 executing program 0: getresuid(0x0, &(0x7f0000000200), 0x0) 04:30:22 executing program 2: getresuid(0x0, &(0x7f0000000200), &(0x7f0000000240)) 04:30:22 executing program 4: getresuid(&(0x7f00000001c0), 0x0, &(0x7f0000000240)) 04:30:22 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:30:22 executing program 2: getresuid(0x0, &(0x7f0000000200), &(0x7f0000000240)) 04:30:22 executing program 0: getresuid(0x0, &(0x7f0000000200), 0x0) 04:30:22 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:22 executing program 4: getresuid(&(0x7f00000001c0), 0x0, &(0x7f0000000240)) 04:30:23 executing program 2: getresuid(0x0, &(0x7f0000000200), &(0x7f0000000240)) 04:30:23 executing program 5: ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) 04:30:23 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:23 executing program 0: getresuid(&(0x7f00000001c0), 0x0, 0x0) 04:30:23 executing program 4: getresuid(0x0, 0x0, &(0x7f0000000240)) 04:30:23 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) 04:30:23 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) 04:30:23 executing program 2: getresuid(0x0, 0x0, &(0x7f0000000240)) 04:30:23 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:23 executing program 4: getresuid(0x0, 0x0, &(0x7f0000000240)) 04:30:23 executing program 0: getresuid(&(0x7f00000001c0), 0x0, 0x0) 04:30:23 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) 04:30:23 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) r3 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r3, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x2c8040) 04:30:23 executing program 1: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:23 executing program 2: getresuid(0x0, 0x0, 0x0) 04:30:23 executing program 0: getresuid(&(0x7f00000001c0), 0x0, 0x0) 04:30:23 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) 04:30:23 executing program 4: getresuid(0x0, 0x0, &(0x7f0000000240)) 04:30:23 executing program 1: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:23 executing program 3: syz_read_part_table(0x7, 0x3, &(0x7f0000000240)=[{&(0x7f0000000040)="d6d319fc505ba34296b499d51723bbe60957796bfe261a18e8439ea9a1f98a495f123ab4f696b5fd8e5a40795c212c0d46b5c851cadd9c9252c5d612e5fcf0b0419d585cc097923eed966df8a5247af39f8a1985c368b2aa9c", 0x59}, {&(0x7f00000000c0)="a792657218994ccbe8f67fc786db07b5961278004b52fb201fd620cab502795cfa3be65fd6d46b86cc651376b433115d516e643c08c307540e6ed5ef291454baf9869b0879f5383e934b522113f814312891", 0x52, 0x1fa9}, {&(0x7f0000000140)="f29b98bba64e1fa0b89109ee27dfd97eecbd66b4be473bede3d489726654162536b69211f75fbb2802ea3b075b44ad79361362b2d43b3fa565e91d0002495941f86d3c306c4aedb99f43e81f61e04dcfc06145706755125d99e94ccf7bf72d2acd27602b6ae38bcb6efed9c23bdf97ee6909bc71cf291687c069cbbacbe53e4d599c42587f5be17f7982aea7f6ba673fa222567cd322198b2171831795c6a6006d1b3a1aa0cd694da68a5af0ad0f0695b6d3f4926d9167691609428fad05db5d139bc231c812d3d8a25101df3e38802ee502bd7f64d53c2463e2d31f213be54db2000000000000000000", 0xea, 0x80000001}]) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) 04:30:23 executing program 4: getresuid(&(0x7f00000001c0), 0x0, 0x0) 04:30:23 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r1, 0x127b, &(0x7f00000001c0)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) r4 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r4, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x2c8040) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r2, 0xc01064bd, &(0x7f00000003c0)={&(0x7f00000002c0)="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", 0xff, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r5, 0xc01064ac, &(0x7f0000000480)={r6, 0x64, &(0x7f0000000400)=""/100}) ioctl$CHAR_RAW_RRPART(r0, 0x2, 0x400000) 04:30:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) 04:30:23 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r1, 0x127b, &(0x7f00000001c0)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) r4 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r4, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x2c8040) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r2, 0xc01064bd, &(0x7f00000003c0)={&(0x7f00000002c0)="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", 0xff, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r5, 0xc01064ac, &(0x7f0000000480)={r6, 0x64, &(0x7f0000000400)=""/100}) ioctl$CHAR_RAW_RRPART(r0, 0x2, 0x400000) 04:30:23 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000040)={[0xfffa]}, &(0x7f0000000080), 0x8) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x2, 0x400000) 04:30:23 executing program 1: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) 04:30:23 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) 04:30:23 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r1, 0x127b, &(0x7f00000001c0)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) r4 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r4, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x2c8040) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r2, 0xc01064bd, &(0x7f00000003c0)={&(0x7f00000002c0)="c4d53863ca9f9ab37aae77eea8f598942fdecfc2c4be003cac2b8b427fe063e76ba679aaa5a1e0a5ae88b2eb61f894a1eb3e6b6123b2f6cc714fcdd09980ce70481d8078ac104254b5cf6e47f4228589e487d6b413bb929f79576857de89fd1bb6add181d1a17bc95ec3fdb5773b013df5becc047e55bc29e422fc5fb75978384cbbd8e7e10c82b57f634610941520cbf8cf5542caa9bca952bb4d929de5e0b2b522e0cf71493a49a1ddae5f808174b1bb69d15679ac200dc05f24646475a87bc2ae41e1db230b54d0a6443d605b37314f186211022bb7d9c4113f02a0632e601c070ec8a5c9b3ccd08be3d45bd1083a59fdf2d18e67539db606dd37f6a24e", 0xff, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r5, 0xc01064ac, &(0x7f0000000480)={r6, 0x64, &(0x7f0000000400)=""/100}) ioctl$CHAR_RAW_RRPART(r0, 0x2, 0x400000) 04:30:23 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000340)={0x5, 0x9f8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f00000002c0)=""/161, 0x0, 0xa1}, 0x20) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00', r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:23 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000040)={[0xfffa]}, &(0x7f0000000080), 0x8) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x2, 0x400000) 04:30:23 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r1, 0x127b, &(0x7f00000001c0)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) r4 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r4, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x2c8040) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r2, 0xc01064bd, &(0x7f00000003c0)={&(0x7f00000002c0)="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", 0xff, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r5, 0xc01064ac, &(0x7f0000000480)={r6, 0x64, &(0x7f0000000400)=""/100}) ioctl$CHAR_RAW_RRPART(r0, 0x2, 0x400000) 04:30:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) 04:30:24 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) 04:30:24 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 04:30:24 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000040)={[0xfffa]}, &(0x7f0000000080), 0x8) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x2, 0x400000) 04:30:24 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000340)={0x5, 0x9f8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f00000002c0)=""/161, 0x0, 0xa1}, 0x20) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00', r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:24 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000340)=0x40, r2, 0x0, 0x0, 0x1}}, 0x20) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x6, 0x118, 0xfa00, {{0xc0, 0x8000, "fe8f19ba357e7bb15c9d50f2fd97fb601646b8d87c53884e9f8700d0c885450bc851ed60705db4c05c91bfc8ae9cf9a2f9f4e989ced859ed150fc636fcd6c80a593c7c420e295744844bb6ac5170c6ee6a4af6e5422ca6f6b71f8fcd1bdbbb569acdf30c0449d8eaee9f44677cab00c6864df16ac54baab90e2f727f5bb223d5d3e6bccd0c2901c102699c2b20ffef761a9a15b73926faf6662790847bfc4988ca78ab1ccb2cd3b5f69473c07eb8f8f28a5a117fac6d19aa71bc519f85cc25993bea2edc3e020aa860d6956c99b3758719e8772e86d524613fcce7c6432a65cdb80c3854ad3f384a34d0636f1415a8aa3be7db4b036111852642dcf19a4bc348", 0x4, 0x1, 0xff, 0xa6, 0x9, 0x1f, 0xc1}, r2}}, 0x120) 04:30:24 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) r3 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r3, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x2c8040) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r1, 0xc01064bd, &(0x7f00000003c0)={&(0x7f00000002c0)="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", 0xff, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r4, 0xc01064ac, &(0x7f0000000480)={r5, 0x64, &(0x7f0000000400)=""/100}) 04:30:24 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000040)={[0xfffa]}, &(0x7f0000000080), 0x8) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:24 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) 04:30:24 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 04:30:24 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000340)={0x5, 0x9f8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f00000002c0)=""/161, 0x0, 0xa1}, 0x20) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00', r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:24 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000040)={[0xfffa]}, &(0x7f0000000080), 0x8) 04:30:24 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000340)=0x40, r2, 0x0, 0x0, 0x1}}, 0x20) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x6, 0x118, 0xfa00, {{0xc0, 0x8000, "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", 0x4, 0x1, 0xff, 0xa6, 0x9, 0x1f, 0xc1}, r2}}, 0x120) 04:30:24 executing program 1: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 04:30:24 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) r3 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r3, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x2c8040) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r1, 0xc01064bd, &(0x7f00000003c0)={&(0x7f00000002c0)="c4d53863ca9f9ab37aae77eea8f598942fdecfc2c4be003cac2b8b427fe063e76ba679aaa5a1e0a5ae88b2eb61f894a1eb3e6b6123b2f6cc714fcdd09980ce70481d8078ac104254b5cf6e47f4228589e487d6b413bb929f79576857de89fd1bb6add181d1a17bc95ec3fdb5773b013df5becc047e55bc29e422fc5fb75978384cbbd8e7e10c82b57f634610941520cbf8cf5542caa9bca952bb4d929de5e0b2b522e0cf71493a49a1ddae5f808174b1bb69d15679ac200dc05f24646475a87bc2ae41e1db230b54d0a6443d605b37314f186211022bb7d9c4113f02a0632e601c070ec8a5c9b3ccd08be3d45bd1083a59fdf2d18e67539db606dd37f6a24e", 0xff}) 04:30:24 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() 04:30:24 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffa]}, &(0x7f0000000080), 0x8) 04:30:24 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000340)={0x5, 0x9f8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f00000002c0)=""/161, 0x0, 0xa1}, 0x20) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00', r3) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "44508f5680799957b41a63d298f8f7f0ca1c1095a9c016f9ccf71d54c148bd930cfe97a260288cb6daf3bf872ba2d1f10f520a453735051fa8ceddd30a3dbfab16d8faae42aea3a9f56a13a4852710e4bfd7798291142145e92c96ece36bdee3bf68ede1c1219cf564e43a012ebeda429dd262ce5ffcdbd8e4a5328449c0a9bd5a0ca8451eaf50aa43c16eb35244b77014604a59f960841221dadee5bbf2558bc03eab2f475d03d362c46b3fe74a861d48dd2eafb1869576a4ebe3663d3331638e35e860e80f1fb89a3c9554ed0cec4490b12a872044f191dd2704b46984a25c60ecdd73f1a04525a681fff96170a8541dd57a5723c6b943d200f778ee00a7bd"}}, 0x110) 04:30:24 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) r3 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r3, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100, 0x2c8040) 04:30:24 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000340)=0x40, r2, 0x0, 0x0, 0x1}}, 0x20) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x6, 0x118, 0xfa00, {{0xc0, 0x8000, "fe8f19ba357e7bb15c9d50f2fd97fb601646b8d87c53884e9f8700d0c885450bc851ed60705db4c05c91bfc8ae9cf9a2f9f4e989ced859ed150fc636fcd6c80a593c7c420e295744844bb6ac5170c6ee6a4af6e5422ca6f6b71f8fcd1bdbbb569acdf30c0449d8eaee9f44677cab00c6864df16ac54baab90e2f727f5bb223d5d3e6bccd0c2901c102699c2b20ffef761a9a15b73926faf6662790847bfc4988ca78ab1ccb2cd3b5f69473c07eb8f8f28a5a117fac6d19aa71bc519f85cc25993bea2edc3e020aa860d6956c99b3758719e8772e86d524613fcce7c6432a65cdb80c3854ad3f384a34d0636f1415a8aa3be7db4b036111852642dcf19a4bc348", 0x4, 0x1, 0xff, 0xa6, 0x9, 0x1f, 0xc1}, r2}}, 0x120) 04:30:24 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() 04:30:24 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() 04:30:24 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffa]}, &(0x7f0000000080), 0x8) 04:30:24 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000340)={0x5, 0x9f8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f00000002c0)=""/161, 0x0, 0xa1}, 0x20) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00', r3) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:24 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) r3 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r3, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:24 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() 04:30:24 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000340)=0x40, r2, 0x0, 0x0, 0x1}}, 0x20) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) 04:30:24 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() 04:30:24 executing program 3: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffa]}, &(0x7f0000000080), 0x8) 04:30:24 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000340)={0x5, 0x9f8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f00000002c0)=""/161, 0x0, 0xa1}, 0x20) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00', r3) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:24 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:24 executing program 0: sync() ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x53b000) 04:30:24 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000340)=0x40, r2, 0x0, 0x0, 0x1}}, 0x20) 04:30:24 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() 04:30:24 executing program 3: rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) 04:30:25 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:25 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000340)={0x5, 0x9f8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f00000002c0)=""/161, 0x0, 0xa1}, 0x20) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:25 executing program 3: rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) 04:30:25 executing program 0: sync() ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x53b000) 04:30:25 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) 04:30:25 executing program 1: sync() 04:30:25 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) sendmsg$AUDIT_GET_FEATURE(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3fb, 0x400, 0x70bd2c, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c0d5) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:25 executing program 0: sync() ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x53b000) 04:30:25 executing program 3: rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) 04:30:25 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000340)={0x5, 0x9f8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f00000002c0)=""/161, 0x0, 0xa1}, 0x20) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:25 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:25 executing program 1: sync() 04:30:25 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:25 executing program 0: sync() ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x53b000) 04:30:25 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000040), &(0x7f0000000080), 0x8) 04:30:25 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:25 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:25 executing program 1: sync() 04:30:25 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000340)={0x5, 0x9f8}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f00000002c0)=""/161, 0x0, 0xa1}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:25 executing program 0: sync() 04:30:25 executing program 3: rt_sigprocmask(0x2, &(0x7f0000000040), 0x0, 0x8) 04:30:25 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:25 executing program 0: sync() 04:30:25 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) ioctl$CHAR_RAW_ZEROOUT(r1, 0x127f, &(0x7f0000000340)={0x5, 0x9f8}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "44508f5680799957b41a63d298f8f7f0ca1c1095a9c016f9ccf71d54c148bd930cfe97a260288cb6daf3bf872ba2d1f10f520a453735051fa8ceddd30a3dbfab16d8faae42aea3a9f56a13a4852710e4bfd7798291142145e92c96ece36bdee3bf68ede1c1219cf564e43a012ebeda429dd262ce5ffcdbd8e4a5328449c0a9bd5a0ca8451eaf50aa43c16eb35244b77014604a59f960841221dadee5bbf2558bc03eab2f475d03d362c46b3fe74a861d48dd2eafb1869576a4ebe3663d3331638e35e860e80f1fb89a3c9554ed0cec4490b12a872044f191dd2704b46984a25c60ecdd73f1a04525a681fff96170a8541dd57a5723c6b943d200f778ee00a7bd"}}, 0x110) 04:30:25 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:25 executing program 1: sync() 04:30:25 executing program 3: sync() 04:30:25 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:25 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:25 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, 0x0, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008005) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "44508f5680799957b41a63d298f8f7f0ca1c1095a9c016f9ccf71d54c148bd930cfe97a260288cb6daf3bf872ba2d1f10f520a453735051fa8ceddd30a3dbfab16d8faae42aea3a9f56a13a4852710e4bfd7798291142145e92c96ece36bdee3bf68ede1c1219cf564e43a012ebeda429dd262ce5ffcdbd8e4a5328449c0a9bd5a0ca8451eaf50aa43c16eb35244b77014604a59f960841221dadee5bbf2558bc03eab2f475d03d362c46b3fe74a861d48dd2eafb1869576a4ebe3663d3331638e35e860e80f1fb89a3c9554ed0cec4490b12a872044f191dd2704b46984a25c60ecdd73f1a04525a681fff96170a8541dd57a5723c6b943d200f778ee00a7bd"}}, 0x110) 04:30:25 executing program 3: sync() 04:30:25 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:25 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:25 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:25 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:25 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:25 executing program 3: sync() 04:30:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:26 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:26 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "44508f5680799957b41a63d298f8f7f0ca1c1095a9c016f9ccf71d54c148bd930cfe97a260288cb6daf3bf872ba2d1f10f520a453735051fa8ceddd30a3dbfab16d8faae42aea3a9f56a13a4852710e4bfd7798291142145e92c96ece36bdee3bf68ede1c1219cf564e43a012ebeda429dd262ce5ffcdbd8e4a5328449c0a9bd5a0ca8451eaf50aa43c16eb35244b77014604a59f960841221dadee5bbf2558bc03eab2f475d03d362c46b3fe74a861d48dd2eafb1869576a4ebe3663d3331638e35e860e80f1fb89a3c9554ed0cec4490b12a872044f191dd2704b46984a25c60ecdd73f1a04525a681fff96170a8541dd57a5723c6b943d200f778ee00a7bd"}}, 0x110) 04:30:26 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) ioctl$CHAR_RAW_PBSZGET(r0, 0x127b, &(0x7f00000001c0)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x300, 0x0) r2 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r2, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:26 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$char_raw(&(0x7f0000000180)='/dev/raw/raw#\x00', 0x1, 0x10a01) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:26 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000340)=0x40, r2, 0x0, 0x0, 0x1}}, 0x20) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) 04:30:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:26 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() 04:30:26 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) sync() 04:30:26 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:26 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x80300, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:26 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:26 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, &(0x7f00000002c0)=0x3) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000280)=0xffff) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3fb, 0x200, 0x70bd2c, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000090}, 0x4000) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$CHAR_RAW_ZEROOUT(r4, 0x127f, &(0x7f0000000080)={0x9, 0x81}) 04:30:26 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x136084fe) 04:30:26 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:26 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x136084fe) 04:30:26 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:26 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, &(0x7f00000002c0)=0x3) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000280)=0xffff) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3fb, 0x200, 0x70bd2c, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000090}, 0x4000) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$CHAR_RAW_ZEROOUT(r4, 0x127f, &(0x7f0000000080)={0x9, 0x81}) 04:30:26 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:26 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:26 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x136084fe) 04:30:26 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:26 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, &(0x7f00000002c0)=0x3) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000280)=0xffff) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3fb, 0x200, 0x70bd2c, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000090}, 0x4000) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$CHAR_RAW_ZEROOUT(r4, 0x127f, &(0x7f0000000080)={0x9, 0x81}) 04:30:26 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:26 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x136084fe) 04:30:26 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:26 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x136084fe) 04:30:26 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:26 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:26 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, &(0x7f00000002c0)=0x3) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000280)=0xffff) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3fb, 0x200, 0x70bd2c, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000090}, 0x4000) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10000, 0x0) 04:30:26 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x136084fe) 04:30:26 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) 04:30:26 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000080)}}, 0x18) 04:30:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:27 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$6lowpan_control(r0, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:27 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) 04:30:27 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, &(0x7f00000002c0)=0x3) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000280)=0xffff) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3fb, 0x200, 0x70bd2c, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000090}, 0x4000) 04:30:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 04:30:27 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) 04:30:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:27 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:27 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) 04:30:27 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, &(0x7f00000002c0)=0x3) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000280)=0xffff) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) 04:30:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 04:30:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:27 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:27 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:27 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, 0x0, 0x0) 04:30:27 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, &(0x7f00000002c0)=0x3) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000280)=0xffff) 04:30:27 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:27 executing program 2: openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(0xffffffffffffffff, &(0x7f0000000240)='connect aa:aa:aa:aa:aa:10 2', 0x1b) 04:30:27 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:27 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:27 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:27 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, &(0x7f00000002c0)=0x3) 04:30:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {0x0}}, 0x18) 04:30:27 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 04:30:27 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:27 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "44508f5680799957b41a63d298f8f7f0ca1c1095a9c016f9ccf71d54c148bd930cfe97a260288cb6daf3bf872ba2d1f10f520a453735051fa8ceddd30a3dbfab16d8faae42aea3a9f56a13a4852710e4bfd7798291142145e92c96ece36bdee3bf68ede1c1219cf564e43a012ebeda429dd262ce5ffcdbd8e4a5328449c0a9bd5a0ca8451eaf50aa43c16eb35244b77014604a59f960841221dadee5bbf2558bc03eab2f475d03d362c46b3fe74a861d48dd2eafb1869576a4ebe3663d3331638e35e860e80f1fb89a3c9554ed0cec4490b12a872044f191dd2704b46984a25c60ecdd73f1a04525a681fff96170a8541dd57a5723c6b943d200f778ee00a7bd"}}, 0x110) 04:30:27 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:27 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:30:27 executing program 5: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, &(0x7f00000002c0)=0x3) 04:30:27 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 04:30:27 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:27 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:27 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 04:30:27 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) 04:30:27 executing program 2: r0 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r0, 0x0, 0x0) 04:30:27 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) 04:30:27 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:27 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 04:30:28 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000280)) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:28 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) 04:30:28 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r2, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x400000) 04:30:28 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 04:30:28 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) 04:30:28 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:28 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r1, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:28 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000280)) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "effbab", "44508f5680799957b41a63d298f8f7f0ca1c1095a9c016f9ccf71d54c148bd930cfe97a260288cb6daf3bf872ba2d1f10f520a453735051fa8ceddd30a3dbfab16d8faae42aea3a9f56a13a4852710e4bfd7798291142145e92c96ece36bdee3bf68ede1c1219cf564e43a012ebeda429dd262ce5ffcdbd8e4a5328449c0a9bd5a0ca8451eaf50aa43c16eb35244b77014604a59f960841221dadee5bbf2558bc03eab2f475d03d362c46b3fe74a861d48dd2eafb1869576a4ebe3663d3331638e35e860e80f1fb89a3c9554ed0cec4490b12a872044f191dd2704b46984a25c60ecdd73f1a04525a681fff96170a8541dd57a5723c6b943d200f778ee00a7bd"}}, 0x110) 04:30:28 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32=r1, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:28 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) 04:30:28 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) 04:30:28 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:28 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:28 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) 04:30:28 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1, 0x6, 0x101, 0x0, 0x0, {0xc, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x24020880) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x5, "effbab", "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"}}, 0x110) 04:30:28 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) 04:30:28 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:28 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000480)={0x10, 0x30, 0xfa00, {&(0x7f0000000440), 0x2, {0xa, 0x4e21, 0x2c24, @local, 0x3ff}}}, 0x38) 04:30:28 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:28 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, 0xfffffffffffffffd) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10cc0, 0x0) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f0000000080)) 04:30:28 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:28 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) 04:30:28 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x400080, 0x0) 04:30:28 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:28 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:28 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:28 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:28 executing program 3: ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000100)={&(0x7f00000000c0)="9039bbf42e112b5520de0e2143a3b1b38f97acf388aa0f23f37073c2b1b6b4a802", 0x21}) r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:28 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:28 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:29 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 3: r0 = syz_open_dev$binderN(0x0, 0x0, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:29 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 3: r0 = syz_open_dev$binderN(0x0, 0x0, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:29 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 3: r0 = syz_open_dev$binderN(0x0, 0x0, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:29 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000280)) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:29 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 3: syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:29 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000280)) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 3: syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:29 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:29 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 1: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:29 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 3: syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:30 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 1: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:30 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:30 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 04:30:30 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 1: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:30 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:30 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) [ 455.025624] binder: 15702:15703 ioctl c0306201 0 returned -14 04:30:30 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 1: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:30 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:30 executing program 1: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) [ 455.192387] binder: 15715:15716 ioctl c0306201 0 returned -14 04:30:30 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 04:30:30 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:30 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 1: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:30 executing program 2: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) [ 455.460509] binder: 15734:15740 ioctl c0306201 0 returned -14 04:30:30 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:30 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:30 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:30 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:30 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:30 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:31 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:31 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:31 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:31 executing program 5: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:31 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:31 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:31 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:31 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 5: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:31 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340), 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:31 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 5: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:31 executing program 4: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:31 executing program 5: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:31 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:31 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:31 executing program 5: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:31 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, 0x0, &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:32 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:32 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 5: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:32 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 5: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 04:30:32 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 5: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000500)=ANY=[@ANYBLOB="852a646600006b64b8b5aff2fbaa0000", @ANYRES32, @ANYBLOB="000000000000000000000000852a68771511000003000000000000000000000000000000852a62730a020000020000000000000000000000000000008fc8605119d3c01712091b9b5576fc26ed363e1f183bd4b6a344b104175f37ef8d8034a35deb74e4e0b65cfb7f118011e4536df5d2ad530a513771e90bfb745026839984b5b242bd400e34ed41d9c1d722cee1e430475019fe8c6e9f326957f60ae27c"], &(0x7f0000000300)={0x0, 0x18, 0x30}}}], 0x4, 0x0, &(0x7f00000003c0)="34ba095d"}) 04:30:32 executing program 5: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}}, 0x8004) 04:30:32 executing program 2: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:32 executing program 2: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}}, 0x0) 04:30:32 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:32 executing program 2: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:32 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:32 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:32 executing program 3: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 0: socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:33 executing program 2: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:33 executing program 3: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:33 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 0: socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:33 executing program 3: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 2: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 0: socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:33 executing program 1: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:33 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:33 executing program 3: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:33 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:33 executing program 2: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 3: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 2: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:33 executing program 4: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 3: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 0: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 2: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 4: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 1: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:33 executing program 2: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:33 executing program 4: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 3: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 1: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:34 executing program 2: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:34 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 3: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 1: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:34 executing program 2: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 2: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)) 04:30:34 executing program 3: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 1: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 04:30:34 executing program 4: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 3: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 04:30:34 executing program 1: socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:34 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}}, 0x8004) 04:30:34 executing program 1: socketpair(0x1e, 0x2, 0x0, 0x0) [ 459.396745] binder: 16127:16132 ioctl c0306201 0 returned -14 04:30:34 executing program 3: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 4: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}}, 0x0) 04:30:34 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 3: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:34 executing program 4: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 1: socketpair(0x1e, 0x2, 0x0, 0x0) 04:30:34 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 4: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:34 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:35 executing program 1: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:35 executing program 5: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:35 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 4: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 0: openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:35 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:35 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:35 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r2, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:35 executing program 4: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:35 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:35 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:35 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:35 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) 04:30:35 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_IOOPT(r3, 0x1279, &(0x7f0000000280)) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x3fa, 0x20, 0x70bd29, 0x25dfdbfb, {0x1, 0x0, 0x1, 0x3}, ["", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10000040}, 0x4004000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000140)=[{0x10, 0x0, [0xff, 0x8, 0x40, 0xb8e, 0x20, 0xb0e3, 0x1, 0x2, 0x9, 0xffffffc1, 0xfffffffe, 0x4, 0x9, 0x100, 0x5]}, {0x24, 0x0, [0x4, 0x7f3, 0x8, 0x1ff, 0xfffffff9, 0x1, 0x101, 0x3, 0x7f, 0x3, 0x2, 0x3f, 0xe4a4, 0x5, 0x80000003, 0x6]}, {0x3, 0x0, [0x3fe, 0x101, 0x4, 0x2, 0x3, 0xaf8, 0x70e, 0xffffffff, 0x7ff, 0x1, 0xecac, 0x7ff, 0x6, 0x3, 0x2, 0x4]}], 0xffffffffffffffff, 0x1, 0x1, 0xd8}}, 0x20) socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r4, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x20, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 4: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:35 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$CHAR_RAW_SECTGET(r1, 0x1267, 0xfffffffffffffffd) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10cc0, 0x0) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f0000000080)) 04:30:35 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r2, 0x5421, 0x4af000) 04:30:35 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$CHAR_RAW_GETSIZE64(r3, 0x80081272, &(0x7f00000000c0)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000240)={0xa, [0x2, 0x3, 0x1ff, 0xf00, 0xfff, 0x7, 0x7ff, 0x200, 0x0, 0x8]}, 0x18) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x3f7, 0x2, 0x70bd2b, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x10) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, &(0x7f0000000540)={@fixed={[], 0x10}, 0x9f, 0x6, 0x3}) 04:30:35 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:35 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r2, 0x5421, 0x4af000) 04:30:35 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 5: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)=0x7f4) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0xc018620c, &(0x7f0000000040)) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x100, 0x1}) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x4af000) 04:30:35 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$CHAR_RAW_GETSIZE64(r3, 0x80081272, &(0x7f00000000c0)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000240)={0xa, [0x2, 0x3, 0x1ff, 0xf00, 0xfff, 0x7, 0x7ff, 0x200, 0x0, 0x8]}, 0x18) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x3f7, 0x2, 0x70bd2b, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x10) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, &(0x7f0000000540)={@fixed={[], 0x10}, 0x9f, 0x6, 0x3}) 04:30:35 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="40800000", @ANYRES16=0x0, @ANYBLOB="000025bd7000ffdbdf250b0000002c000280080003000300000008000400ff7f000006000e004e210000060002004e21000008000700000000002961bef0b39d7a478e48940c608ffd691b91ac179ec9cc2b016053c3b25fda5728ed6c8b"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8005) r5 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xf2, 0x40) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000740)={0x0, 0x0, r6}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x1000, 0x4) 04:30:35 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$CHAR_RAW_GETSIZE64(r3, 0x80081272, &(0x7f00000000c0)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000240)={0xa, [0x2, 0x3, 0x1ff, 0xf00, 0xfff, 0x7, 0x7ff, 0x200, 0x0, 0x8]}, 0x18) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x3f7, 0x2, 0x70bd2b, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x10) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r5, 0x800443d3, &(0x7f0000000540)={@fixed={[], 0x10}, 0x9f, 0x6, 0x3}) 04:30:35 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:35 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r2, 0x5421, 0x4af000) 04:30:35 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:36 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="40800000", @ANYRES16=0x0, @ANYBLOB="000025bd7000ffdbdf250b0000002c000280080003000300000008000400ff7f000006000e004e210000060002004e21000008000700000000002961bef0b39d7a478e48940c608ffd691b91ac179ec9cc2b016053c3b25fda5728ed6c8b"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8005) r5 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xf2, 0x40) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000740)={0x0, 0x0, r6}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x1000, 0x4) 04:30:36 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$CHAR_RAW_GETSIZE64(r3, 0x80081272, &(0x7f00000000c0)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000240)={0xa, [0x2, 0x3, 0x1ff, 0xf00, 0xfff, 0x7, 0x7ff, 0x200, 0x0, 0x8]}, 0x18) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x3f7, 0x2, 0x70bd2b, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x10000, 0x0) 04:30:36 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:36 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="40800000", @ANYRES16=0x0, @ANYBLOB="000025bd7000ffdbdf250b0000002c000280080003000300000008000400ff7f000006000e004e210000060002004e21000008000700000000002961bef0b39d7a478e48940c608ffd691b91ac179ec9cc2b016053c3b25fda5728ed6c8b"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8005) r5 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xf2, 0x40) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000740)={0x0, 0x0, r6}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x1000, 0x4) 04:30:36 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$CHAR_RAW_GETSIZE64(r3, 0x80081272, &(0x7f00000000c0)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000240)={0xa, [0x2, 0x3, 0x1ff, 0xf00, 0xfff, 0x7, 0x7ff, 0x200, 0x0, 0x8]}, 0x18) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x3f7, 0x2, 0x70bd2b, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x10) 04:30:36 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:36 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:36 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:36 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$CHAR_RAW_GETSIZE64(r3, 0x80081272, &(0x7f00000000c0)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000240)={0xa, [0x2, 0x3, 0x1ff, 0xf00, 0xfff, 0x7, 0x7ff, 0x200, 0x0, 0x8]}, 0x18) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) 04:30:36 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="40800000", @ANYRES16=0x0, @ANYBLOB="000025bd7000ffdbdf250b0000002c000280080003000300000008000400ff7f000006000e004e210000060002004e21000008000700000000002961bef0b39d7a478e48940c608ffd691b91ac179ec9cc2b016053c3b25fda5728ed6c8b"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8005) r5 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xf2, 0x40) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000740)={0x0, 0x0, r6}) 04:30:36 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:36 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$CHAR_RAW_GETSIZE64(r3, 0x80081272, &(0x7f00000000c0)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000240)={0xa, [0x2, 0x3, 0x1ff, 0xf00, 0xfff, 0x7, 0x7ff, 0x200, 0x0, 0x8]}, 0x18) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) 04:30:36 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="40800000", @ANYRES16=0x0, @ANYBLOB="000025bd7000ffdbdf250b0000002c000280080003000300000008000400ff7f000006000e004e210000060002004e21000008000700000000002961bef0b39d7a478e48940c608ffd691b91ac179ec9cc2b016053c3b25fda5728ed6c8b"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8005) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xf2, 0x40) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r5, 0x125e, 0x0) 04:30:36 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:36 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="40800000", @ANYRES16=0x0, @ANYBLOB="000025bd7000ffdbdf250b0000002c000280080003000300000008000400ff7f000006000e004e210000060002004e21000008000700000000002961bef0b39d7a478e48940c608ffd691b91ac179ec9cc2b016053c3b25fda5728ed6c8b"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8005) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xf2, 0x40) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:30:36 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f00000000c0)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000240)={0xa, [0x2, 0x3, 0x1ff, 0xf00, 0xfff, 0x7, 0x7ff, 0x200, 0x0, 0x8]}, 0x18) 04:30:36 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:36 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="40800000", @ANYRES16=0x0, @ANYBLOB="000025bd7000ffdbdf250b0000002c000280080003000300000008000400ff7f000006000e004e210000060002004e21000008000700000000002961bef0b39d7a478e48940c608ffd691b91ac179ec9cc2b016053c3b25fda5728ed6c8b"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8005) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xf2, 0x40) 04:30:36 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f00000000c0)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:36 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:36 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:37 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="40800000", @ANYRES16=0x0, @ANYBLOB="000025bd7000ffdbdf250b0000002c000280080003000300000008000400ff7f000006000e004e210000060002004e21000008000700000000002961bef0b39d7a478e48940c608ffd691b91ac179ec9cc2b016053c3b25fda5728ed6c8b"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8005) 04:30:37 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:37 executing program 1: clock_settime(0x0, &(0x7f0000000080)) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:37 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x8004) 04:30:37 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) 04:30:37 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:37 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 04:30:37 executing program 1: clock_settime(0x0, &(0x7f0000000080)) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:37 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) 04:30:37 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:37 executing program 1: clock_settime(0x0, &(0x7f0000000080)) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:37 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 4: clock_settime(0x0, &(0x7f0000000080)) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:37 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) 04:30:37 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 1: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:37 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x8004) 04:30:37 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000480)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:37 executing program 4: clock_settime(0x0, &(0x7f0000000080)) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:37 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:30:37 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:37 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 04:30:37 executing program 1: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:37 executing program 4: clock_settime(0x0, &(0x7f0000000080)) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:37 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:37 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) 04:30:37 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:37 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x8004) 04:30:37 executing program 4: clock_settime(0x0, &(0x7f0000000080)) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:37 executing program 1: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:37 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:37 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) 04:30:37 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 04:30:37 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x8004) 04:30:37 executing program 4: clock_settime(0x0, &(0x7f0000000080)) 04:30:37 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:38 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) 04:30:38 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:38 executing program 4: clock_settime(0x0, 0x0) 04:30:38 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:38 executing program 2: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:38 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r1, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r1) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) ioctl$CHAR_RAW_RESETZONE(r3, 0x40101283, &(0x7f00000001c0)={0x401, 0x400}) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="40800000", @ANYRES16=0x0, @ANYBLOB="000025bd7000ffdbdf250b0000002c000280080003000300000008000400ff7f000006000e004e210000060002004e21000008000700000000002961bef0b39d7a478e48940c608ffd691b91ac179ec9cc2b016053c3b25fda5728ed6c8b"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8005) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0xf2, 0x40) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:30:38 executing program 4: clock_settime(0x0, 0x0) 04:30:38 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000007c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000240)={0x4cc, 0x0, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve1\x00'}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e25, 0x7, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_NET={0x64, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x97}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1200000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x41e2}]}, @TIPC_NLA_BEARER={0xb8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @empty, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x14, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xc86a, @mcast2, 0x200}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @ipv4={[], [], @empty}, 0x1}}}}]}, @TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'ib', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ea}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'wg0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xb4, @mcast1, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x46, 0x4, {'gcm(aes)\x00', 0x1e, "e59907a3eb1fdb1f89cf9b0b2221cd541dbd22396849c2c5fb224ba81ea6"}}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc00}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3a8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3ff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}]}, 0x4cc}, 0x1, 0x0, 0x0, 0x48080}, 0x4800) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r0) 04:30:38 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:38 executing program 2: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:38 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:38 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:38 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r0) 04:30:38 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:38 executing program 2: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:38 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x4af000) 04:30:38 executing program 4: clock_settime(0x0, 0x0) 04:30:38 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:38 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r0) 04:30:38 executing program 2: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:38 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:38 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:38 executing program 0: socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:38 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x4af000) 04:30:38 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, r0) 04:30:38 executing program 2: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:38 executing program 0: socketpair(0x0, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:38 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:38 executing program 4: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:38 executing program 2: clock_settime(0x0, 0x0) 04:30:38 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, 0xffffffffffffffff) 04:30:38 executing program 0: socketpair(0x0, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:38 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x4af000) 04:30:38 executing program 4: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:38 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) 04:30:38 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:38 executing program 5: syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, 0xffffffffffffffff) 04:30:38 executing program 0: socketpair(0x0, 0xa, 0xffffffff, &(0x7f00000004c0)) 04:30:38 executing program 3: clock_settime(0x0, &(0x7f0000000080)) 04:30:38 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x4af000) 04:30:38 executing program 4: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:39 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$char_raw(&(0x7f0000000440)='/dev/raw/raw#\x00', 0x1, 0x2002) ioctl$CHAR_RAW_GETSIZE64(r2, 0x80081272, &(0x7f0000000480)) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x100, 0x400) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$CHAR_RAW_GETSIZE64(r3, 0x80081272, &(0x7f00000000c0)) socketpair(0x2c, 0xa, 0xffffffff, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000240)={0xa, [0x2, 0x3, 0x1ff, 0xf00, 0xfff, 0x7, 0x7ff, 0x200, 0x0, 0x8]}, 0x18) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x3f7, 0x2, 0x70bd2b, 0x25dfdbfb, {0x7, 0x7, './file0', './file0'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x10000, 0x0) 04:30:39 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:39 executing program 3: clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x4af000) 04:30:39 executing program 0: socketpair(0x2c, 0x0, 0xffffffff, &(0x7f00000004c0)) 04:30:39 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:39 executing program 4: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) 04:30:39 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:39 executing program 3: clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 0: socketpair(0x2c, 0x0, 0x0, &(0x7f00000004c0)) 04:30:39 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x4af000) 04:30:39 executing program 4: clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) 04:30:39 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:39 executing program 3: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 0: socketpair(0x2c, 0x0, 0x0, 0x0) 04:30:39 executing program 4: clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) r2 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r2, 0x5421, 0x4af000) 04:30:39 executing program 2: clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:39 executing program 3: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 0: socketpair(0x2c, 0x0, 0x0, 0x0) 04:30:39 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) r2 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r2, 0x5421, 0x4af000) 04:30:39 executing program 2: clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 4: clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 0: socketpair(0x2c, 0x0, 0x0, 0x0) 04:30:39 executing program 5: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:39 executing program 4: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x4af000) 04:30:39 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) r2 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r2, 0x5421, 0x4af000) 04:30:39 executing program 5: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:39 executing program 3: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 2: clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 4: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x4af000) 04:30:39 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:39 executing program 4: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 5: sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:39 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:39 executing program 2: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) 04:30:39 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x4af000) 04:30:39 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:39 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:39 executing program 5: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:40 executing program 4: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:40 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:40 executing program 2: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) 04:30:40 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:40 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) 04:30:40 executing program 4: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:40 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:40 executing program 2: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) 04:30:40 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:40 executing program 5: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:40 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) 04:30:40 executing program 4: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:40 executing program 2: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:40 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) 04:30:40 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) 04:30:40 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:40 executing program 2: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:40 executing program 0: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) 04:30:40 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) 04:30:40 executing program 5: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:40 executing program 4: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) 04:30:40 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:40 executing program 0: clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:40 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) 04:30:40 executing program 5: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:40 executing program 2: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:40 executing program 4: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) 04:30:40 executing program 3: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) 04:30:40 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+10000000}) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5421, 0x4af000) 04:30:40 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) 04:30:40 executing program 0: clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:40 executing program 5: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:40 executing program 4: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) 04:30:40 executing program 3: socketpair(0x0, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:40 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:40 executing program 0: clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:40 executing program 5: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:40 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) 04:30:40 executing program 4: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) 04:30:41 executing program 1: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)) 04:30:41 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfa7}]}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x20000810) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000100)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x4c090}, 0x20000001) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x0, 0x0, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xd944000}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xbc0}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0xd1}, 0x0) socket$l2tp6(0xa, 0x2, 0x73) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x400000) 04:30:41 executing program 0: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:41 executing program 5: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:41 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={0x0, r0+10000000}) 04:30:41 executing program 4: clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:41 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="914766cec30f208f79aa7a1ee73aa3413cf57b10fd44598bd70ddbefde77e4a162de41234433d5e479795e6e66b971ae37014aba43ea8e788fb2fc682fd15397c6a3c35de92fa80645a6a33a4933ba667fa4048c2ef09b904ef963dfd832e4f66c18460d7864de40acb26339e9d7a8fa01e2f3cc1ddfb02ba6b77f9a2d1680ac006b9ea7ddd8c3ed0eae420831fd7383e3f189c4249b437a09d6482798f3d4432ac348d92c9c07858f3d0eec2faff93fc021d93760a5fb501063f0c50e567e3b79acef57febeedcd9d69e4146d38ec190f3b897c221713e771086b56dd896d377526b5c395a61d0f0ebee255026956442c1dc6e0cda39903fa43fcae", 0xfc) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:41 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r4}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r5, 0x125e, 0x0) write$6lowpan_control(r5, &(0x7f00000001c0)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x53b000) 04:30:41 executing program 5: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:41 executing program 0: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:41 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) 04:30:41 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x20002, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000400)={0x6c, 0x0, &(0x7f0000000300)=[@decrefs={0x40046307, 0x2}, @enter_looper, @acquire_done={0x40106309, 0x3}, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000240)={@flat=@weak_handle={0x77682a85, 0x100, 0x1}, @fda={0x66646185, 0x3, 0x0, 0x1f}, @fda={0x66646185, 0x5, 0x0, 0x33}}, &(0x7f00000002c0)={0x0, 0x18, 0x38}}}, @register_looper, @register_looper], 0x63, 0x0, &(0x7f0000000380)="833e2738af3e37f414ef07283dba5e4531d645fc28b1692bee4af5b04294a5086c7c7e2f2f1ca9d454f0496004ccf43933933897c11ecee48a794d1a7d32b7b698a04b953963a848dbef5998d90bbbad9a0a18485cff3fbc2ebb8d48c77492ca9d5122"}) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000200)={0x2, [0x800, 0x1]}, 0x8) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00', r0) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r4, 0x2, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x83}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000010}, 0xc0c0010) 04:30:41 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100000000, 0x432001) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000000207010100000000000000000a0000400000000108000540000000000900010073797a30000000002400078008090140000000030800014000000005080001400000800008000140000000040900010073797a31000000000000000037d382a9440e07eac285075eae040ce1fd3226a83a762a9a0b1b5522a71e26feaaa57f577ddfcdd1b4870ea22900d6d0c0de8b6bbc2ee0fcb5eaeb8cfe89e6a5821609932c12670f4c263d9e7f4b34db2e8e2ce821f1b077edfb3e8193828890a7496f539043e983e6b03a1836dcf143a7d1f041165625e322328de156e2c34867c0f4dc79f95d2c8dcedd70448d21c8009b95f454ca08f08335d97107d4ebf8821e4adb46725305b8e91d41469d70ff5267b0b064ecbfbcf627f975232a75"], 0x60}, 0x1, 0x0, 0x0, 0x50}, 0x4000000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) 04:30:41 executing program 5: socketpair(0x1e, 0x2, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:41 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r4}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r5, 0x125e, 0x0) write$6lowpan_control(r5, &(0x7f00000001c0)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x53b000) 04:30:41 executing program 0: clock_gettime(0x0, 0x0) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:41 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, 0x0}) 04:30:41 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100000000, 0x432001) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x50}, 0x4000000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) 04:30:41 executing program 1: syz_read_part_table(0x120, 0x9, &(0x7f0000000980)=[{&(0x7f00000003c0)="d33c53a96c8b1f5f672f5d6b8c418d328f3aa908bde53b236991a7f61f4df89027b8f2eb461272380e87544e456d099c5f2d2411bd411fa1b5fbad43df40d1ad370fd41f0543aeabb1ec1f3e467f46bfed26ac2fdfb653435a64795660a05230d223117fd1b36cf3f12f4a210ab7bfc60e6b083a94efe162a20a3d86787489f10a629a8b173a9b377e5e48f3", 0x8c, 0x3}, {&(0x7f0000000480)="6ce4476c36daf2627d1aced4f7886814e34c0852fc4e17879a4e6fcf97e3dde227b3c579496d7bb83f8a3f64312b7bae422f43828ebe508fc861579b704d8960ebea110a2ca81e697724b863e8bd2867d7b6b860ce68f5073857ad7c9c445155d0ce71638119552b41b2b6420f5ff2f300c22491204e213961acd9339128f1438837269306f9d820c9165c43410117b4dae621042934d9db6f2c766df73caf4680c2cbbb097b0e64930bc48513af3da1affebe224e8cf22a0ca2d5adb56a1acc8d4050957e1e7d91f6588e5c888639", 0xcf, 0x40}, {&(0x7f0000000580)="969e36919761a5382dcf339bcea34f99f856d5e83e91482f6d1584327529a148f91ce7c50cb1b40aba5714f307a44c14c95f02f927738992d0a7de5ed295c3793ccb5efc0d", 0x45, 0x9e}, {&(0x7f0000000600)="c61942c318397b5e499cf0eb9a3a6b47f465e68d965dca7ea4495a5d3f3b95f16f38718c932e53117006c52a202fe1fde0aeda0878e8bb4492274356e229668d44054a898234d65865ddf4eee9898d9a154a81e45c9952815a31f4b5706e94d528d1aaae0d2738b05e6e19ccc46964c0ec6ad005f1dc076b96b47ee0353732b45caed17e2d7b23a93297993d756a78f11c8d6d823f92a70a6e4eb4e468f029f3912c4c5bf36180f2bec438195faffcae7ce91e38e6c1ebc330425c249ce0d5d29fa465e496c7b94f53907f", 0xcb, 0x81}, {&(0x7f0000000700)="6072486bb55aedaf3525e770d6e4283aee94fc1c86d310fd05c0a4f3c48b5b49a5c2e74e1fb97286fa22b9370f1ad9dc1e8ecf3099426c90cf6c078a16e724fa82de47e6678330dfcdfddc76857add5a1688672d192f6095f976b9f4396270834c35db3ee0dd", 0x66, 0xfff}, {&(0x7f0000000780)="a9dd6f70235976734ba8de787d15de53b9591917b33a8c90b96832f6085254d5c1488ec4cd309c603737ff2ce565f133024a7e74c11049592bd7f011832a648f8869da9a30d36d6a3741039f27bb94067efbcabf74fe03660ba1f684cd1c5e3f23c54ff199fd6f10d976893f4a2cf3d9258e8489723646fb5fac66a9d5ce46007a7c28c203770a287e29c614afae0fd1dc518d046995d3534afb4ae7b8ba8ba9a3eb7321850c6558acd183b1da9ae386fee7a4ff16e81414609384df2285bae4e9a52d4920ec5e1a", 0xc8, 0xffff}, {&(0x7f0000000880)="6eb5ef7469c712a02c9e1056230f3efa", 0x10, 0xa0c8}, {&(0x7f00000008c0)="7ebf7f97c51f233a1c37d4877588001b060803c1727c74a864d1b184c86b69ebcd4e9b2926a5ea", 0x27, 0x5}, {&(0x7f0000000900)="03aa3e9758a26bf2d478614f2a782bf3d47aea6e39e26c1e130c69168afaa073cdf09b1dd67dc6309d8fe5c7d673795bb9eef131056d0770241e2d5716c34d61a790e32d051e89b3d1222451f3f24f942e9199179e439cbd17d04ccbf12481470a", 0x61, 0x1}]) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x2a4}, 0x1, 0x0, 0x0, 0x44}, 0x4000080) 04:30:41 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:41 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:41 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:41 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r4}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r5, 0x125e, 0x0) write$6lowpan_control(r5, &(0x7f00000001c0)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x5421, 0x53b000) 04:30:41 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000100)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_NODE={0x54, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "188c2148f34a5567d5b7ec61f9f2afe229435ba3316f07dee8948a8a20ec20f972"}}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xbd3a}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x372}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) 04:30:41 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:41 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100000000, 0x432001) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000000207010100000000000000000a0000400000000108000540000000000900010073797a30000000002400078008090140000000030800014000000005080001400000800008000140000000040900010073797a31000000000000000037d382a9440e07eac285075eae040ce1fd3226a83a762a9a0b1b5522a71e26feaaa57f577ddfcdd1b4870ea22900d6d0c0de8b6bbc2ee0fcb5eaeb8cfe89e6a5821609932c12670f4c263d9e7f4b34db2e8e2ce821f1b077edfb3e8193828890a7496f539043e983e6b03a1836dcf143a7d1f041165625e322328de156e2c34867c0f4dc79f95d2c8dcedd70448d21c8009b95f454ca08f08335d97107d4ebf8821e4adb46725305b8e91d41469d70ff5267b0b064ecbfbcf627f975232a75"], 0x60}, 0x1, 0x0, 0x0, 0x50}, 0x4000000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) 04:30:41 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:41 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x20002) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd830}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x56c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x2004811) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) accept4$alg(r3, 0x0, 0x0, 0xc0000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x8001) 04:30:41 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r4, 0x125e, 0x0) write$6lowpan_control(r4, &(0x7f00000001c0)='connect aa:aa:aa:aa:aa:10 0', 0x1b) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) 04:30:41 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000100)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_NODE={0x54, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "188c2148f34a5567d5b7ec61f9f2afe229435ba3316f07dee8948a8a20ec20f972"}}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xbd3a}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x372}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) 04:30:41 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:41 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x20002) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd830}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x56c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x2004811) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) accept4$alg(r3, 0x0, 0x0, 0xc0000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x8001) 04:30:41 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:41 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100000000, 0x432001) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x50}, 0x4000000) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) 04:30:41 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000100)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_NODE={0x54, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "188c2148f34a5567d5b7ec61f9f2afe229435ba3316f07dee8948a8a20ec20f972"}}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xbd3a}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x372}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) 04:30:41 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r4, 0x125e, 0x0) write$6lowpan_control(r4, &(0x7f00000001c0)='connect aa:aa:aa:aa:aa:10 0', 0x1b) 04:30:41 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:41 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100000000, 0x432001) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000000207010100000000000000000a0000400000000108000540000000000900010073797a30000000002400078008090140000000030800014000000005080001400000800008000140000000040900010073797a31000000000000000037d382a9440e07eac285075eae040ce1fd3226a83a762a9a0b1b5522a71e26feaaa57f577ddfcdd1b4870ea22900d6d0c0de8b6bbc2ee0fcb5eaeb8cfe89e6a5821609932c12670f4c263d9e7f4b34db2e8e2ce821f1b077edfb3e8193828890a7496f539043e983e6b03a1836dcf143a7d1f041165625e322328de156e2c34867c0f4dc79f95d2c8dcedd70448d21c8009b95f454ca08f08335d97107d4ebf8821e4adb46725305b8e91d41469d70ff5267b0b064ecbfbcf627f975232a75"], 0x60}, 0x1, 0x0, 0x0, 0x50}, 0x4000000) 04:30:42 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000100)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:30:42 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:42 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x20002) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd830}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x56c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x2004811) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) accept4$alg(r3, 0x0, 0x0, 0xc0000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x8001) 04:30:42 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:42 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100000000, 0x432001) 04:30:42 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:42 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r4, 0x125e, 0x0) 04:30:42 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000100)) 04:30:42 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x20002) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd830}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x56c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x2004811) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) accept4$alg(r2, 0x0, 0x0, 0xc0000) 04:30:42 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, 0x0, 0x8004) 04:30:42 executing program 4: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x100000000, 0x432001) 04:30:42 executing program 0: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:42 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:30:42 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:42 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) 04:30:42 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x20002) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd830}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x56c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x2004811) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0xc0000) 04:30:42 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$CHAR_RAW_GETSIZE64(r1, 0x80081272, &(0x7f0000000100)) 04:30:42 executing program 4: syz_open_dev$vcsa(0x0, 0x100000000, 0x432001) 04:30:42 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) 04:30:42 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:42 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) 04:30:42 executing program 4: syz_open_dev$vcsa(0x0, 0x100000000, 0x432001) 04:30:42 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x20002) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd830}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x56c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x2004811) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x904f00) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xc0000) 04:30:42 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:30:42 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) 04:30:42 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:42 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) 04:30:42 executing program 4: syz_open_dev$vcsa(0x0, 0x100000000, 0x432001) 04:30:42 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x20002) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd830}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x56c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x2004811) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xc0000) 04:30:42 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) 04:30:42 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:42 executing program 4: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x432001) 04:30:42 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x8004) 04:30:42 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) 04:30:42 executing program 4: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) 04:30:42 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000}, 0x8004) 04:30:42 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:42 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x20002) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xc0000) 04:30:42 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 04:30:42 executing program 4: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) 04:30:43 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) 04:30:43 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xc0000) 04:30:43 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:43 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:43 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x5, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2042, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:30:43 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) 04:30:43 executing program 4: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) 04:30:43 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xc0000) 04:30:43 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:43 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:43 executing program 5: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) 04:30:43 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xff]}, &(0x7f0000000080), 0x8) 04:30:43 executing program 4: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x0) 04:30:43 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xc0000) 04:30:43 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:43 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:43 executing program 5: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, &(0x7f0000000080)={0x0, 0x0}) 04:30:43 executing program 4: clock_gettime(0x0, &(0x7f0000000000)) clock_settime(0x0, 0x0) 04:30:43 executing program 1: rt_sigprocmask(0x1, 0x0, &(0x7f0000000080), 0x0) 04:30:43 executing program 2: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xc0000) 04:30:43 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:43 executing program 2: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:30:43 executing program 1: rt_sigprocmask(0x1, 0x0, &(0x7f0000000080), 0x0) 04:30:43 executing program 0: ioctl$CHAR_RAW_BSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2400, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x3}}, 0x10) 04:30:43 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x904f00) 04:30:43 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x4af000) 04:30:43 executing program 2: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:30:43 executing program 1: rt_sigprocmask(0x1, 0x0, &(0x7f0000000080), 0x0) 04:30:43 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x130, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xd}}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x22}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2d, 0x8}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xec}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe}]}, 0x130}, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:43 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x400000) 04:30:43 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x4af000) 04:30:43 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x904f00) 04:30:43 executing program 2: accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:30:43 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:43 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000040), &(0x7f0000000080), 0x8) 04:30:43 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x400000) 04:30:43 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x904f00) 04:30:43 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x4af000) 04:30:43 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:43 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000040), 0x0, 0x8) 04:30:43 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) 04:30:43 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x400000) 04:30:43 executing program 5: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x4af000) 04:30:44 executing program 4: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x904f00) 04:30:44 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) 04:30:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:44 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x53b000) 04:30:44 executing program 0: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x400000) 04:30:44 executing program 5: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x4af000) 04:30:44 executing program 4: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x904f00) 04:30:44 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x53b000) 04:30:44 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) 04:30:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:44 executing program 5: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x4af000) 04:30:44 executing program 0: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x400000) 04:30:44 executing program 4: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x904f00) 04:30:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:44 executing program 2: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x4020940d, 0x4af000) 04:30:44 executing program 0: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x400000) 04:30:44 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x53b000) 04:30:44 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x4af000) 04:30:44 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x904f00) 04:30:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:44 executing program 2: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x4020940d, 0x4af000) 04:30:44 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x400000) 04:30:44 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x904f00) 04:30:44 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x4af000) 04:30:44 executing program 1: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5460, 0x53b000) 04:30:44 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:44 executing program 2: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x4020940d, 0x4af000) 04:30:44 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x400000) 04:30:44 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x904f00) 04:30:44 executing program 1: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5460, 0x53b000) 04:30:44 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x4af000) 04:30:44 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:44 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) 04:30:44 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x904f00) 04:30:44 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x400000) 04:30:44 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x4af000) 04:30:44 executing program 1: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5460, 0x53b000) 04:30:44 executing program 3: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:44 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x400000) 04:30:44 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 04:30:44 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x53b000) 04:30:44 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x4af000) 04:30:45 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x904f00) 04:30:45 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) 04:30:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 04:30:45 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x400000) 04:30:45 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x53b000) 04:30:45 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x904f00) 04:30:45 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x4af000) 04:30:45 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) 04:30:45 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x400000) 04:30:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 04:30:45 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x53b000) 04:30:45 executing program 5: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0xc0189436, 0x4af000) 04:30:45 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x4020940d, 0x4af000) 04:30:45 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x40049409, 0x4af000) 04:30:45 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x53b000) 04:30:45 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x904f00) 04:30:45 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5460, 0x53b000) 04:30:45 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x4020940d, 0x4af000) 04:30:45 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:45 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x53b000) 04:30:45 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x40049409, 0x4af000) 04:30:45 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x904f00) 04:30:45 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x4020940d, 0x4af000) 04:30:45 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5460, 0x53b000) 04:30:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:45 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x53b000) 04:30:45 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x40049409, 0x4af000) 04:30:45 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x904f00) 04:30:45 executing program 1: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5460, 0x53b000) 04:30:45 executing program 4: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x40049409, 0x4af000) 04:30:45 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) 04:30:45 executing program 0: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x53b000) 04:30:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:45 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) 04:30:45 executing program 3: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x904f00) 04:30:45 executing program 4: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x40049409, 0x4af000) 04:30:45 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x53b000) 04:30:45 executing program 0: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x53b000) 04:30:45 executing program 4: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x40049409, 0x4af000) 04:30:45 executing program 3: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x904f00) 04:30:45 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x2, 0x4af000) 04:30:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0x7) [ 470.717235] FAULT_INJECTION: forcing a failure. [ 470.717235] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 470.766949] CPU: 1 PID: 17260 Comm: syz-executor.1 Not tainted 4.19.177-syzkaller #0 [ 470.774869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.784258] Call Trace: [ 470.786964] dump_stack+0x1fc/0x2ef [ 470.791789] should_fail.cold+0xa/0xf [ 470.795650] ? lock_acquire+0x170/0x3c0 [ 470.799693] ? setup_fault_attr+0x200/0x200 [ 470.804153] __alloc_pages_nodemask+0x239/0x2890 [ 470.808971] ? mark_held_locks+0xf0/0xf0 [ 470.813174] ? __lock_acquire+0x6de/0x3ff0 [ 470.817513] ? ima_match_policy+0x9d9/0x12e0 [ 470.821953] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 470.826823] ? get_page_from_freelist+0x1d60/0x4170 [ 470.831885] ? mark_held_locks+0xa6/0xf0 [ 470.836055] ? bad_range+0x260/0x3c0 [ 470.839805] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 470.844406] ? __lock_acquire+0x6de/0x3ff0 [ 470.848729] alloc_pages_vma+0xf2/0x780 [ 470.852802] wp_page_copy+0x219/0x2c40 [ 470.856713] ? _vm_normal_page+0x132/0x510 [ 470.860988] ? clear_subpage.constprop.0+0x100/0x100 [ 470.866160] do_wp_page+0x2d4/0x2210 [ 470.869919] ? finish_mkwrite_fault+0x640/0x640 [ 470.874606] ? __handle_mm_fault+0x15f6/0x41c0 [ 470.879203] ? mark_held_locks+0xf0/0xf0 [ 470.883281] __handle_mm_fault+0x258b/0x41c0 [ 470.887711] ? vm_insert_page+0x9c0/0x9c0 [ 470.891958] ? check_preemption_disabled+0x41/0x280 [ 470.897005] handle_mm_fault+0x436/0xb10 [ 470.901133] __do_page_fault+0x68e/0xd60 [ 470.905253] ? trace_hardirqs_off_caller+0x6e/0x210 [ 470.910294] ? spurious_fault+0x840/0x840 [ 470.914508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 470.919419] page_fault+0x1e/0x30 [ 470.922945] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 470.928610] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 470.948049] RSP: 0018:ffff888070397d10 EFLAGS: 00010202 [ 470.953424] RAX: ffffed100e072fb4 RBX: 0000000000000008 RCX: 0000000000000001 [ 470.960709] RDX: 0000000000000000 RSI: ffff888070397d98 RDI: 000000000053b000 04:30:46 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x4af000) 04:30:46 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5450, 0x4af000) 04:30:46 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5451, 0x4af000) [ 470.967997] RBP: ffff888070397d98 R08: 0000000000000000 R09: ffffed100e072fb3 [ 470.975367] R10: ffff888070397d9f R11: 0000000000000000 R12: 000000000053b000 [ 470.982775] R13: 000000000053b008 R14: 00007ffffffff000 R15: 0000000000000000 [ 470.990074] _copy_to_user+0xe2/0x100 [ 470.993976] do_vfs_ioctl+0x77d/0x12e0 [ 470.997883] ? lock_downgrade+0x720/0x720 [ 471.002075] ? check_preemption_disabled+0x41/0x280 [ 471.007107] ? ioctl_preallocate+0x200/0x200 [ 471.011533] ? __fget+0x356/0x510 [ 471.015026] ? do_dup2+0x450/0x450 04:30:46 executing program 3: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x904f00) 04:30:46 executing program 0: ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x53b000) [ 471.018638] ? vfs_write+0x393/0x540 [ 471.022384] ? fput+0x2b/0x190 [ 471.025597] ksys_ioctl+0x9b/0xc0 [ 471.029080] __x64_sys_ioctl+0x6f/0xb0 [ 471.032980] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 471.037833] do_syscall_64+0xf9/0x620 [ 471.041843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.047152] RIP: 0033:0x465ef9 04:30:46 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x40049409, 0x4af000) [ 471.050391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 471.069771] RSP: 002b:00007f9bf617b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 471.077584] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 471.085058] RDX: 000000000053b000 RSI: 0000000000005460 RDI: 0000000000000003 [ 471.092608] RBP: 00007f9bf617b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 471.099889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 471.107527] R13: 00007fff720a8e2f R14: 00007f9bf617b300 R15: 0000000000022000 04:30:46 executing program 1 (fault-call:1 fault-nth:1): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x53b000) 04:30:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0x2000018c) 04:30:46 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x4af000) 04:30:46 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x904f00) 04:30:46 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x53b000) 04:30:46 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x40049409, 0x4af000) 04:30:46 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x4af000) 04:30:46 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x904f00) 04:30:46 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x53b000) 04:30:46 executing program 5: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000440)={0x6, 0x118, 0xfa00, {{0x1d, 0x101, "df1bbbf4967a8eab6a67e4b552658064443466736b8551ee8e935e84d2f46837ee300d26773c44484386aaa768d21a0587857526afb773f0747a5e29bd2c6b253c64b0b7087caa38b7afdeb0f4e92ac0e797362588fd7b3ab6bafc2d621c23f4c19e922cd7e5f5506d9219da048fb7f0cce2f8329e2095c5253c12931e44537261525903131f341fbe1f27996f6caab9f762c14fa04cb3c4debaa0e7a07c7bb8ea0a8ee799dd35fb1f86148c26efce42cb0fbcb6827736013653be6d2e94643a4a9e6238b4735a4d25884c7a92279aa39e9c5ec1f11b512e80961a9006101f54920d9c6a709461b801fabafa6c77a10000008000", 0x4, 0x6, 0x9e, 0x7, 0x1, 0x3, 0x9, 0x5}}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000180)={0xa, 0x4}, 0xc) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x50b682) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x240480, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0x5, 0x804, "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", 0x0, 0x3f, 0x8, 0xf2, 0x7f, 0x1, 0x1f, 0x1}}}, 0x128) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x1001, 0x3}) 04:30:46 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x53b000) 04:30:46 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x40049409, 0x4af000) 04:30:46 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x904f00) 04:30:46 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x40049409, 0x4af000) 04:30:46 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x53b000) 04:30:46 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x2, 0x53b000) 04:30:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$CHAR_RAW_BSZSET(r6, 0x40081271, &(0x7f0000000480)=0x4) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:46 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x904f00) 04:30:46 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0045878, 0x4af000) 04:30:46 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x40049409, 0x4af000) 04:30:46 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x53b000) 04:30:46 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5421, 0x53b000) 04:30:46 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x904f00) [ 471.615517] audit: type=1107 audit(1614400246.801:132): pid=17334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='ªÒÆ8R5´ÿuÝX]õácŽv-çä'32' 04:30:46 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x40049409, 0x4af000) 04:30:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'batadv_slave_0\x00', 0x0}) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xe0, 0x12, 0x4, 0x70bd25, 0x25dfdbff, {0x27, 0x9, 0x7, 0x3e, {0x4e22, 0x4e20, [0x3, 0x1, 0x8, 0x89], [0x796d26f7, 0x6, 0x7, 0x3de3], r1, [0x20]}, 0xffff, 0x400}, [@INET_DIAG_REQ_BYTECODE={0x93, 0x1, "af83dea41d4ce0b82b1f582cee9b7ffe72402d9608495117bd862b2cb2e58813e55a0617e2920c83eb9b2a4ebfd0556bda006a710bcb4876d77631f655bc914f168ac02e48a1a1b4b34627afcf5f9192258cf467d7844cda8ca0f896d01dca9e5a09025f3ce90000448411b94fb799627b9948780bae0221d18fe9d8f07f4453d199df92d22de3f6834f66a341cd18"}]}, 0xe0}, 0x1, 0x0, 0x0, 0x48004}, 0x90) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000004c0)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000580)={&(0x7f0000000500)="b009b1859dff521696faca38f8662c01eb01a8f3acc3b49e697830f02ad7c1f95d3e633311f31a86324c797cf439acdf2dd995b66613b87fba60a1cec31a8df1ec2822ab68b1210feb42b759", 0x4c, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r2, 0xc01064ac, &(0x7f00000006c0)={r3, 0xf3, &(0x7f00000005c0)=""/243}) 04:30:46 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0045878, 0x4af000) [ 471.672830] audit: type=1107 audit(1614400246.841:133): pid=17334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='ªÒÆ8R5´ÿuÝX]õácŽv-çä'32' 04:30:46 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x53b000) 04:30:46 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5450, 0x53b000) 04:30:47 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x904f00) 04:30:47 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x4af000) 04:30:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) bind$vsock_dgram(r1, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000040)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x7}}, 0x10) 04:30:47 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x40049409, 0x4af000) 04:30:47 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x5452, 0x53b000) 04:30:47 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5451, 0x53b000) 04:30:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$CHAR_RAW_BSZSET(r6, 0x40081271, &(0x7f0000000480)=0x4) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$CHAR_RAW_BSZSET(r6, 0x40081271, &(0x7f0000000480)=0x4) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:47 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc020660b, 0x4af000) 04:30:47 executing program 4: write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000440)={0x6, 0x118, 0xfa00, {{0x1d, 0x101, "df1bbbf4967a8eab6a67e4b552658064443466736b8551ee8e935e84d2f46837ee300d26773c44484386aaa768d21a0587857526afb773f0747a5e29bd2c6b253c64b0b7087caa38b7afdeb0f4e92ac0e797362588fd7b3ab6bafc2d621c23f4c19e922cd7e5f5506d9219da048fb7f0cce2f8329e2095c5253c12931e44537261525903131f341fbe1f27996f6caab9f762c14fa04cb3c4debaa0e7a07c7bb8ea0a8ee799dd35fb1f86148c26efce42cb0fbcb6827736013653be6d2e94643a4a9e6238b4735a4d25884c7a92279aa39e9c5ec1f11b512e80961a9006101f54920d9c6a709461b801fabafa6c77a10000008000", 0x4, 0x6, 0x9e, 0x7, 0x1, 0x3, 0x9, 0x5}}}, 0x120) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000100)=0x1, 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000180)={0xa, 0x4}, 0xc) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x50b682) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x240480, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x3, {0x5, 0x804, "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", 0x0, 0x3f, 0x8, 0xf2, 0x7f, 0x1, 0x1f, 0x1}}}, 0x128) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x1001, 0x3}) 04:30:47 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5452, 0x53b000) 04:30:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$CHAR_RAW_BSZSET(r6, 0x40081271, &(0x7f0000000480)=0x4) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) [ 472.025646] audit: type=1107 audit(1614400247.211:134): pid=17386 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='ªÒÆ8R5´ÿuÝX]õácŽv-çä'32' 04:30:47 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4f9000) 04:30:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000640)={0xa, 0x4}, 0xffffffffffffff54) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f00000006c0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x9}}, 0x10) ioctl$CHAR_RAW_ROGET(r3, 0x125e, 0x0) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x6, "cbc60a", "d35fd977894ae3e250b04da52295e89be9c14b2f5c3e00c2eb47ddf6bda5ee74719104bdc6c2828175fc179dac8842e25f6e7fa3eb9b88bf2d003d3fa4f26e16a0dacef16c710b41827023ff7a4552dfdedb9c41c4fa8769e7ce734f31169e934a36cbc7b204a5fcbd51bd3e2dc32a2300deaba6cbf0cf4243d7b1f98844f5a1597a8b7d17016064705c1df2cd57607aa6df762ca3d49a9fd79d6c97b03b7d0a24b17d8d33c8f2d80fcf028d252032e1d60e261af14b8915468c6bafaa1e899af8b4aff6d959840a5acf0f61cc1784ad05f8e2aa030b32e6d45a762fe53cced0fb75df8d0e3dabee0595aef356cb33fd7ff30d8d765a62f1e9724cde52f5ac73"}}, 0x110) ioctl$CHAR_RAW_ALIGNOFF(r1, 0x127a, &(0x7f0000000680)) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x6, 0x0, "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", 0x87, 0x9, 0x76, 0x1b, 0x3, 0x40, 0x7}}}, 0x120) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r4, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400080, 0x0) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000300), r5, 0x1}}, 0x18) 04:30:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$CHAR_RAW_BSZSET(r6, 0x40081271, &(0x7f0000000480)=0x4) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) [ 472.100313] audit: type=1107 audit(1614400247.291:135): pid=17392 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='ªÒÆ8R5´ÿuÝX]õácŽv-çä'32' 04:30:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$CHAR_RAW_BSZSET(r6, 0x40081271, &(0x7f0000000480)=0x4) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:47 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x53b000) 04:30:47 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x40049409, 0x53b000) [ 472.168078] audit: type=1107 audit(1614400247.351:136): pid=17404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='ªÒÆ8R5´ÿuÝX]õácŽv-çä'32' 04:30:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:47 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x550000) 04:30:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4}, 0xc) 04:30:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) ioctl$CHAR_RAW_BSZSET(r6, 0x40081271, &(0x7f0000000480)=0x4) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) [ 472.319074] audit: type=1107 audit(1614400247.501:137): pid=17417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='ªÒÆ8R5´ÿuÝX]õácŽv-çä'32' 04:30:47 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x53b000) 04:30:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0x16, 0x4}, 0xc) [ 472.387527] audit: type=1107 audit(1614400247.501:138): pid=17419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='ªÒÆ8R5´ÿuÝX]õácŽv-çä'32' 04:30:47 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x970000) 04:30:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r5, 0x125e, 0x0) ioctl$CHAR_RAW_BSZSET(r5, 0x40081271, &(0x7f0000000480)=0x4) [ 472.467881] audit: type=1107 audit(1614400247.651:139): pid=17443 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='ªÒÆ8R5´ÿuÝX]õácŽv-çä'32' 04:30:47 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0045878, 0x53b000) 04:30:47 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x14ac000) 04:30:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) [ 472.527982] audit: type=1107 audit(1614400247.691:140): pid=17445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='ªÒÆ8R5´ÿuÝX]õácŽv-çä'32' 04:30:47 executing program 4: write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:47 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) r5 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:47 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r5, 0x125e, 0x0) [ 472.626823] audit: type=1107 audit(1614400247.811:141): pid=17467 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='ªÒÆ8R5´ÿuÝX]õácŽv-çä'32' 04:30:47 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0045878, 0x53b000) 04:30:47 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x7fffffffefff) 04:30:47 executing program 4: write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r1, 0x80, "b9a97b", "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"}}, 0x110) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:48 executing program 2: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) 04:30:48 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc0189436, 0x53b000) 04:30:48 executing program 4: write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x8002) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000080)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), 0xffffffffffffffff, 0x7fff}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) connect$vsock_dgram(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000100)={@any, 0x2}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x2}}, 0x20) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000006c0)={'wlan1\x00'}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r3, &(0x7f0000000680)={0x5, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0xe3ccefbc84f641ee}}, 0x18) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sendmsg$AUDIT_USER_AVC(r5, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, 0x453, 0x100, 0x70bd2d, 0x25dfdbfe, "a894e278220533bb4655230e5e116fcf3bb264a877598feb03b99ff83b2ce850f845ba2ebc225e657077bf621779", [""]}, 0x40}, 0x1, 0x0, 0x0, 0x4000800}, 0x40000d0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r6, 0x125e, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r7, 0x125e, 0x0) ioctl$SNDCTL_TMR_METRONOME(r7, 0x40045407) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) 04:30:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:48 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r0, 0x125e, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00'}) r2 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x93de, 0x60100) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000001c0)=""/158) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) 04:30:48 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0xc020660b, 0x53b000) 04:30:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) 04:30:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:48 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x53b008) 04:30:48 executing program 5: syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00', 0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4}, 0xc) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000240)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000100)={0xb, 0x11, 0xfa00, {&(0x7f0000000180), r2, 0xfffffffd}}, 0xfffffffffffffe27) 04:30:48 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400402}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3f2, 0x4, 0x70bd2a, 0x25dfdbfe, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000050}, 0x8048000) 04:30:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r3, 0x6}}, 0x10) 04:30:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r2, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r3, 0x1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r4, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:48 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x544000) 04:30:48 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x4001, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x4020940d, 0x4af000) sendmsg$AUDIT_SIGNAL_INFO(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f2, 0x2, 0x70bd2b, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x20002001}, 0x20000040) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 04:30:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)}}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r2, 0x1}}, 0x18) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r2, 0x6}}, 0x10) 04:30:48 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:48 executing program 5: write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000000c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, 0x5c6}}, 0x18) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_audit(0x10, 0x3, 0x9) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) 04:30:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)}}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r2, 0x1}}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:48 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x550000) 04:30:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)}}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r2, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r2, 0x6}}, 0x10) 04:30:48 executing program 2: sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="d0000000", @ANYRES16=0x0, @ANYBLOB="000325bd7000ffdbdf2506000000080006000000008008000500df000000140001800600020000000000080008000104000008000500000400000c00038008120100000000001c00028008000300000004000800040002000000060002004e23000008000400020000002800038014000200766c616e30000000000000000000000008000500000000000800030004000000300003800800010001000000080003000000000014000600ff02000000000000000000000000000108000500e00000010800050001000080"], 0xd0}}, 0x1) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) 04:30:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:48 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x570000) 04:30:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)}}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r2, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r2, 0x6}}, 0x10) 04:30:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x10}}, 0x10) 04:30:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)}}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r2, 0x1}}, 0x18) r3 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:48 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) 04:30:48 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x5460, 0x970000) 04:30:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)}}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r2, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r2, 0x6}}, 0x10) 04:30:48 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000080)={0x38c, 0x0, 0x1, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x194, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x40, 0x4, {'gcm(aes)\x00', 0x18, "8181331a3d34a33f3f83a569f2cec4c50e714461c4e6a127"}}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "c0b8fff32d0b052cedec3a91120a8a55c06c4f3333f99b74012aa169"}}, @TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "2f5450e3dcd90879eafbc8bfb7475177d037b5f06e7e9d1f5060931d366f179133f69426"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x295b}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "2c480d953ddb113dee64510274bb7c57ddfa8def"}}, @TIPC_NLA_NODE_ID={0x6e, 0x3, "3e59bf20acff44865aa26c54b93bc22ace43cefb5bddd87f533ba218a4d955feafdc90a78efc4bbfa10a000ad71c695c149fb740d83349e17f467bb7f147a232f3c6c3d2eb8bed0db5a658cbd14267e7a7c0dc2ca3ce7b4f55edd6a539d514325616ab50df7099d06144"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0xa4, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xf7fa}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3e78b032}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f1d}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x53}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}]}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x800}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8e7086f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x400}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x368f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x200}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8cc}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xb6b7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xa6e1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x800}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xac}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x44}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x156a}]}]}, 0x38c}, 0x1, 0x0, 0x0, 0x1}, 0x801) 04:30:48 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)}}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x106, 0xc3a298e21ad99ffc}}, 0x20) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4}, 0xc) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) 04:30:48 executing program 4: openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x4}, 0xc) 04:30:48 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)}}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0xc3a298e21ad99ffc}}, 0x20) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f00000002c0)={0x4, 0x8, 0xfa00, {r2, 0x6}}, 0x10) 04:30:48 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$CHAR_RAW_RRPART(r0, 0x4020940d, 0x4af000) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) ioctl$CHAR_RAW_ZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000000)={0x7, 0xc8}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x202800, 0x0) ioctl$CHAR_RAW_RRPART(r1, 0x125f, 0x0) ioctl$CHAR_RAW_RESETZONE(r1, 0x40101283, &(0x7f0000000100)={0xfffffffffffffffb, 0x1745}) syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00', r0) 04:30:49 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)}}, 0x20) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$CHAR_RAW_ROGET(r1, 0x125e, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="840000005304040027bd7000fddbdf25aad2c602385235b40816ff75dd585d05f5e1638e762de7e427101a1433320000297d9daa027aaf71496993a63097deac7df2f7cbc71cbb97411f3d5d4d5890df264a7c3c36a9a4d560c829c122000e061c79f6c9f7ec048bab41c4351b4b2a08be64f72ce1b44d3e435911dbf2cdf6093b9bcc06"], 0x84}, 0x1, 0x0, 0x0, 0x44800}, 0x4000000) 04:30:49 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 04:30:49 executing program 5: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0xc}}, 0xfffffffffffffd99) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000180)={0xa, 0x4}, 0xc) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000140), &(0x7f00000001c0)=0x4) [ 474.606565] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 474.616218] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 474.625553] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 474.632523] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 474.643172] device bridge_slave_1 left promiscuous mode [ 474.648855] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.659750] device bridge_slave_0 left promiscuous mode [ 474.665570] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.679322] device veth1_macvtap left promiscuous mode [ 474.685945] device veth0_macvtap left promiscuous mode [ 474.691673] device veth1_vlan left promiscuous mode [ 474.696956] device veth0_vlan left promiscuous mode [ 474.786125] device hsr_slave_1 left promiscuous mode [ 474.794978] device hsr_slave_0 left promiscuous mode [ 474.811660] team0 (unregistering): Port device team_slave_1 removed [ 474.823929] team0 (unregistering): Port device team_slave_0 removed [ 474.835576] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 474.847785] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 474.879759] bond0 (unregistering): Released all slaves [ 476.378270] IPVS: ftp: loaded support on port[0] = 21 [ 476.495068] chnl_net:caif_netlink_parms(): no params data found [ 476.558498] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.565160] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.573178] device bridge_slave_0 entered promiscuous mode [ 476.580083] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.586663] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.593988] device bridge_slave_1 entered promiscuous mode [ 476.614144] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 476.623262] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 476.643485] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 476.652020] team0: Port device team_slave_0 added [ 476.657582] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 476.665935] team0: Port device team_slave_1 added [ 476.683853] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 476.690095] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 476.715644] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 476.726918] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 476.733248] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 476.758742] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 476.770132] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 476.777693] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 476.799019] device hsr_slave_0 entered promiscuous mode [ 476.804765] device hsr_slave_1 entered promiscuous mode [ 476.811774] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 476.818779] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 476.888958] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.895396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 476.902245] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.908686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 476.946849] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 476.953897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 476.963110] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 476.973322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 476.980596] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.987876] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.995594] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 477.006855] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 477.013310] 8021q: adding VLAN 0 to HW filter on device team0 [ 477.023209] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 477.031323] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.037749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.048617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 477.057071] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.063524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.082220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 477.090397] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 477.107663] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 477.117475] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 477.131659] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 477.138716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 477.147328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 477.155432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 477.163889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 477.177987] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 477.185913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 477.195962] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 477.207373] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 477.222344] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 477.232645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 477.269815] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 477.277169] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 477.284740] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 477.295198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 477.304031] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 477.312336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 477.321627] device veth0_vlan entered promiscuous mode [ 477.331077] device veth1_vlan entered promiscuous mode [ 477.336858] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 477.348023] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 477.360206] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 477.370740] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 477.378502] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 477.386177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 477.397285] device veth0_macvtap entered promiscuous mode [ 477.403927] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 477.413646] device veth1_macvtap entered promiscuous mode [ 477.423249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 477.433510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 477.443490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 477.454454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.464924] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 477.474753] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.484117] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 477.494371] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.503596] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 477.513456] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.522653] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 477.533001] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.544328] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 477.553148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 477.562969] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 477.573720] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 477.583736] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.594256] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 477.605006] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.614268] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 477.624128] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.633308] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 477.643126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.654237] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 477.664036] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 477.674261] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 477.681371] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 477.688026] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 477.696547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 477.815263] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 477.824005] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 477.851424] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 477.853437] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 477.872287] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 477.880076] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 477.888372] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 477.896426] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 479.897029] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 479.904415] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 479.913669] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 479.920341] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 479.928859] device bridge_slave_1 left promiscuous mode [ 479.934563] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.942340] device bridge_slave_0 left promiscuous mode [ 479.947845] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.957773] device veth1_macvtap left promiscuous mode [ 479.963323] device veth0_macvtap left promiscuous mode [ 479.968633] device veth1_vlan left promiscuous mode [ 479.974696] device veth0_vlan left promiscuous mode [ 482.422447] Bluetooth: hci1: command 0x0409 tx timeout [ 484.420620] device hsr_slave_1 left promiscuous mode [ 484.428962] device hsr_slave_0 left promiscuous mode [ 484.446644] team0 (unregistering): Port device team_slave_1 removed [ 484.458227] team0 (unregistering): Port device team_slave_0 removed [ 484.468503] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 484.480094] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 484.503024] Bluetooth: hci1: command 0x041b tx timeout [ 484.514255] bond0 (unregistering): Released all slaves [ 484.530159] IPVS: ftp: loaded support on port[0] = 21 [ 484.641753] chnl_net:caif_netlink_parms(): no params data found [ 484.739462] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.748197] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.757296] device bridge_slave_0 entered promiscuous mode [ 484.766016] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.772494] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.781472] device bridge_slave_1 entered promiscuous mode [ 484.807261] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 484.817510] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 484.843624] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 484.851470] team0: Port device team_slave_0 added [ 484.859122] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 484.868116] team0: Port device team_slave_1 added [ 484.891687] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 484.898553] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 484.925382] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 484.938384] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 484.945648] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 484.972319] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 484.984645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 484.992491] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 485.022360] device hsr_slave_0 entered promiscuous mode [ 485.028822] device hsr_slave_1 entered promiscuous mode [ 485.036610] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 485.045062] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 485.195225] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.201726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.208519] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.214960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.285613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 485.295560] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 485.308482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 485.316651] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.331389] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.346152] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 485.352275] 8021q: adding VLAN 0 to HW filter on device team0 [ 485.372711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 485.402796] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.409395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.442437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 485.450600] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.457040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.490224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 485.498832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 485.519234] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 485.535385] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 485.552322] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 485.562394] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 485.575937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 485.588819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 485.598154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 485.618672] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 485.631035] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 485.640291] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 485.648593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 485.667924] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 485.687629] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 485.698318] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 485.706304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 485.715167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 485.779749] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 485.788002] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 485.796742] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 485.808816] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 485.816030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 485.825723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 485.836622] device veth0_vlan entered promiscuous mode [ 485.846338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 485.855436] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 485.866167] device veth1_vlan entered promiscuous mode [ 485.872382] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 485.896108] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 485.918491] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 485.936921] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 485.949778] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 485.959725] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 485.968013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 485.978361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 485.989931] device veth0_macvtap entered promiscuous mode [ 485.996381] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 486.005842] device veth1_macvtap entered promiscuous mode [ 486.012093] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 486.022816] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 486.033830] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 486.042448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 486.052306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.061718] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 486.072230] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.081465] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 486.091521] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.100718] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 486.110747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.119950] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 486.129776] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.140081] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 486.147529] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 486.156523] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 486.164397] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 486.171624] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 486.179590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 486.190155] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 486.200442] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.209719] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 486.219535] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.228768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 486.238587] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.248107] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 486.258092] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.267791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 486.277891] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 486.288286] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 486.295266] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 486.303047] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 486.311770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 486.448799] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 486.456672] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 486.485084] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 486.499349] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 486.519045] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 486.531953] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 486.539323] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 486.547278] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 486.584224] Bluetooth: hci1: command 0x040f tx timeout [ 488.619034] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 488.626400] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 488.635107] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 488.641864] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 488.650452] device bridge_slave_1 left promiscuous mode [ 488.657139] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.665511] device bridge_slave_0 left promiscuous mode [ 488.670986] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.681274] device veth1_macvtap left promiscuous mode [ 488.686818] device veth0_macvtap left promiscuous mode [ 488.692285] device veth1_vlan left promiscuous mode [ 488.697503] device veth0_vlan left promiscuous mode [ 491.155083] Bluetooth: hci1: command 0x0409 tx timeout [ 493.130506] device hsr_slave_1 left promiscuous mode [ 493.139678] device hsr_slave_0 left promiscuous mode [ 493.154851] team0 (unregistering): Port device team_slave_1 removed [ 493.169600] team0 (unregistering): Port device team_slave_0 removed [ 493.180398] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 493.191445] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 493.223120] bond0 (unregistering): Released all slaves [ 493.229146] Bluetooth: hci1: command 0x041b tx timeout [ 493.245907] IPVS: ftp: loaded support on port[0] = 21 [ 493.351470] chnl_net:caif_netlink_parms(): no params data found [ 493.454810] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.461526] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.470643] device bridge_slave_0 entered promiscuous mode [ 493.479341] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.487178] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.494852] device bridge_slave_1 entered promiscuous mode [ 493.520975] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 493.532053] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 493.558646] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 493.569516] team0: Port device team_slave_0 added [ 493.575447] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 493.584525] team0: Port device team_slave_1 added [ 493.609113] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 493.615913] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 493.643439] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 493.663175] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 493.671462] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 493.698919] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 493.710965] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 493.719705] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 493.748167] device hsr_slave_0 entered promiscuous mode [ 493.754728] device hsr_slave_1 entered promiscuous mode [ 493.762981] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 493.771405] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 493.922815] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.929269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 493.936157] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.942565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 493.996845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 494.007667] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 494.020201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 494.029911] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.038801] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.054676] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 494.061758] 8021q: adding VLAN 0 to HW filter on device team0 [ 494.074425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 494.083981] bridge0: port 1(bridge_slave_0) entered blocking state [ 494.090529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 494.120920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 494.132181] bridge0: port 2(bridge_slave_1) entered blocking state [ 494.138641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 494.172849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 494.181604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 494.209591] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 494.219818] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 494.233614] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 494.242556] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 494.256743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 494.264608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 494.287367] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 494.296576] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 494.302885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 494.310829] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 494.318369] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 494.333217] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 494.365615] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 494.382639] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 494.391059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 494.399636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 494.470142] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 494.477994] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 494.484998] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 494.498260] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 494.505258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 494.514699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 494.524037] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 494.537610] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 494.546607] device veth0_vlan entered promiscuous mode [ 494.558774] device veth1_vlan entered promiscuous mode [ 494.565071] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 494.575613] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 494.591183] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 494.602318] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 494.610102] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 494.618460] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 494.626508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 494.634350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 494.644852] device veth0_macvtap entered promiscuous mode [ 494.652724] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 494.664012] device veth1_macvtap entered promiscuous mode [ 494.671105] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 494.685772] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 494.698715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 494.710171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 494.720745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 494.736199] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 494.747658] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 494.758158] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 494.768942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 494.778219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 494.788049] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 494.797526] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 494.807355] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 494.818366] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 494.825446] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 494.834587] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 494.842434] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 494.850173] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 494.858232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 494.871653] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 494.881515] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 494.891998] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 494.905212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 494.914767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 494.925576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 494.934896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 494.944705] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 494.953980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 494.964951] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 494.976922] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 494.983831] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 494.992374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 495.000813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 495.132969] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 495.141007] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 495.155744] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 495.191035] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 495.212301] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 495.220241] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 495.228992] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 495.235741] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 497.296472] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 497.303575] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 497.313405] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 497.321503] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 497.330982] device bridge_slave_1 left promiscuous mode [ 497.336480] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.344646] device bridge_slave_0 left promiscuous mode [ 497.350867] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.360163] device veth1_macvtap left promiscuous mode [ 497.365460] device veth0_macvtap left promiscuous mode [ 497.371056] device veth1_vlan left promiscuous mode [ 497.376116] device veth0_vlan left promiscuous mode [ 499.866878] Bluetooth: hci1: command 0x0409 tx timeout [ 501.802929] device hsr_slave_1 left promiscuous mode [ 501.810923] device hsr_slave_0 left promiscuous mode [ 501.830878] team0 (unregistering): Port device team_slave_1 removed [ 501.841167] team0 (unregistering): Port device team_slave_0 removed [ 501.851369] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 501.863066] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 501.893484] bond0 (unregistering): Released all slaves [ 501.909843] IPVS: ftp: loaded support on port[0] = 21 [ 501.946312] Bluetooth: hci1: command 0x041b tx timeout [ 502.019062] chnl_net:caif_netlink_parms(): no params data found [ 502.109042] bridge0: port 1(bridge_slave_0) entered blocking state [ 502.115801] bridge0: port 1(bridge_slave_0) entered disabled state [ 502.123811] device bridge_slave_0 entered promiscuous mode [ 502.132779] bridge0: port 2(bridge_slave_1) entered blocking state [ 502.139573] bridge0: port 2(bridge_slave_1) entered disabled state [ 502.149749] device bridge_slave_1 entered promiscuous mode [ 502.185313] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 502.200820] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 502.228884] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 502.238681] team0: Port device team_slave_0 added [ 502.244782] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 502.253295] team0: Port device team_slave_1 added [ 502.274769] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 502.282043] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 502.307838] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 502.320337] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 502.326983] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 502.354458] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 502.365983] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 502.374160] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 502.400873] device hsr_slave_0 entered promiscuous mode [ 502.407129] device hsr_slave_1 entered promiscuous mode [ 502.413520] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 502.421377] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 502.569398] bridge0: port 2(bridge_slave_1) entered blocking state [ 502.575820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 502.582584] bridge0: port 1(bridge_slave_0) entered blocking state [ 502.588337] ieee802154 phy0 wpan0: encryption failed: -22 [ 502.589001] bridge0: port 1(bridge_slave_0) entered forwarding state [ 502.594501] ieee802154 phy1 wpan1: encryption failed: -22 [ 502.680628] 8021q: adding VLAN 0 to HW filter on device bond0 [ 502.697814] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 502.715903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 502.725086] bridge0: port 1(bridge_slave_0) entered disabled state [ 502.739531] bridge0: port 2(bridge_slave_1) entered disabled state [ 502.762886] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 502.769372] 8021q: adding VLAN 0 to HW filter on device team0 [ 502.781882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 502.790415] bridge0: port 1(bridge_slave_0) entered blocking state [ 502.796836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 502.817460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 502.825286] bridge0: port 2(bridge_slave_1) entered blocking state [ 502.831735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 502.865112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 502.877180] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 502.896718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 502.916501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 502.927733] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 502.937851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 502.945690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 502.956822] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 502.962906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 502.987917] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 502.997317] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 503.003606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 503.014120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 503.026991] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 503.044031] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 503.055523] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 503.063059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 503.072834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 503.139051] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 503.147048] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 503.153928] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 503.165171] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 503.172320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 503.181191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 503.192045] device veth0_vlan entered promiscuous mode [ 503.198764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 503.206995] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 503.223264] device veth1_vlan entered promiscuous mode [ 503.233144] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 503.250328] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 503.267473] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 503.278770] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 503.285703] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 503.294375] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 503.302487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 503.310968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 503.321606] device veth0_macvtap entered promiscuous mode [ 503.328981] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 503.339467] device veth1_macvtap entered promiscuous mode [ 503.346467] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 503.356932] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 503.370157] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 503.379695] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 503.390171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.399661] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 503.409797] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.419310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 503.429387] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.438896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 503.449032] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.458257] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 503.469434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.479675] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 503.487571] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 503.495279] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 503.503044] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 503.511248] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 503.519377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 503.529839] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 503.540275] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.550568] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 503.560747] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.571588] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 503.581412] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.590968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 503.600764] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.610043] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 503.619834] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 503.630751] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 503.637849] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 503.645065] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 503.653621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 503.777198] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 503.794622] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 503.813839] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 503.831541] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 503.842334] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 503.842885] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 503.858325] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 503.875172] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 505.935142] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 505.941913] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 505.951544] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 505.959856] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 505.968608] device bridge_slave_1 left promiscuous mode [ 505.974086] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.982067] device bridge_slave_0 left promiscuous mode [ 505.987870] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.997273] device veth1_macvtap left promiscuous mode [ 506.002573] device veth0_macvtap left promiscuous mode [ 506.008081] device veth1_vlan left promiscuous mode [ 506.013125] device veth0_vlan left promiscuous mode [ 508.425636] Bluetooth: hci1: command 0x0409 tx timeout [ 510.432510] device hsr_slave_1 left promiscuous mode [ 510.440488] device hsr_slave_0 left promiscuous mode [ 510.456391] team0 (unregistering): Port device team_slave_1 removed [ 510.466391] team0 (unregistering): Port device team_slave_0 removed [ 510.476254] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 510.486711] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 510.505579] Bluetooth: hci1: command 0x041b tx timeout [ 510.524148] bond0 (unregistering): Released all slaves [ 510.542319] IPVS: ftp: loaded support on port[0] = 21 [ 510.650141] chnl_net:caif_netlink_parms(): no params data found [ 510.742933] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.749838] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.757836] device bridge_slave_0 entered promiscuous mode [ 510.766224] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.772664] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.781378] device bridge_slave_1 entered promiscuous mode [ 510.806461] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 510.816783] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 510.840194] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 510.848814] team0: Port device team_slave_0 added [ 510.854693] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 510.863125] team0: Port device team_slave_1 added [ 510.885071] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 510.891731] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 510.918373] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 510.930872] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 510.937861] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 510.963786] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 510.975763] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 510.983490] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 511.011245] device hsr_slave_0 entered promiscuous mode [ 511.018633] device hsr_slave_1 entered promiscuous mode [ 511.025056] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 511.032999] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 511.154085] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.160537] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.167297] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.173685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.252348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 511.269104] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 511.283789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 511.294107] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.308888] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.327533] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 511.333715] 8021q: adding VLAN 0 to HW filter on device team0 [ 511.352841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 511.367739] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.374200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.413070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 511.421922] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.428396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.439872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 511.448924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 511.474297] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 511.481764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 511.496956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 511.506264] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 511.512308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 511.542703] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 511.553661] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 511.569378] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 511.580494] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 511.599102] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 511.625253] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 511.645225] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 511.656405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 511.664537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 511.729839] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 511.743962] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 511.753571] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 511.771507] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 511.784041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 511.795135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 511.812699] device veth0_vlan entered promiscuous mode [ 511.822688] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 511.834128] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 511.849135] device veth1_vlan entered promiscuous mode [ 511.855393] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 511.878217] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 511.900708] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 511.916501] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 511.923637] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 511.932370] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 511.940550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 511.949476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 511.959966] device veth0_macvtap entered promiscuous mode [ 511.967235] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 511.976122] device veth1_macvtap entered promiscuous mode [ 511.982338] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 511.991935] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 512.003140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 512.012102] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.022646] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.032767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.042602] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.053497] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.064614] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.073835] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.083657] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.092857] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.103180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.113933] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 512.121183] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 512.128938] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 512.136900] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 512.144029] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 512.152014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 512.162227] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.172258] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.181717] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.191509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.200680] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.210436] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.219593] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.229368] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.238538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.248359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.258509] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 512.265376] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 512.273845] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 512.282125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 512.413083] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 512.419756] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 512.439500] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 512.454009] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 512.462376] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 512.476416] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 512.483282] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 512.496706] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 514.500807] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 514.508104] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 514.516927] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 514.524452] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 514.533482] device bridge_slave_1 left promiscuous mode [ 514.539444] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.548017] device bridge_slave_0 left promiscuous mode [ 514.553502] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.563665] device veth1_macvtap left promiscuous mode [ 514.569198] device veth0_macvtap left promiscuous mode [ 514.574524] device veth1_vlan left promiscuous mode [ 514.579690] device veth0_vlan left promiscuous mode [ 517.066328] Bluetooth: hci1: command 0x0409 tx timeout [ 519.008711] device hsr_slave_1 left promiscuous mode [ 519.017391] device hsr_slave_0 left promiscuous mode [ 519.031190] team0 (unregistering): Port device team_slave_1 removed [ 519.045185] team0 (unregistering): Port device team_slave_0 removed [ 519.055665] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 519.068593] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 519.101690] bond0 (unregistering): Released all slaves [ 519.117458] IPVS: ftp: loaded support on port[0] = 21 [ 519.146312] Bluetooth: hci1: command 0x041b tx timeout [ 519.238802] chnl_net:caif_netlink_parms(): no params data found [ 519.353575] bridge0: port 1(bridge_slave_0) entered blocking state [ 519.361753] bridge0: port 1(bridge_slave_0) entered disabled state [ 519.370920] device bridge_slave_0 entered promiscuous mode [ 519.379683] bridge0: port 2(bridge_slave_1) entered blocking state [ 519.387255] bridge0: port 2(bridge_slave_1) entered disabled state [ 519.394916] device bridge_slave_1 entered promiscuous mode [ 519.420999] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 519.431684] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 519.455749] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 519.464506] team0: Port device team_slave_0 added [ 519.479001] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 519.488828] team0: Port device team_slave_1 added [ 519.512031] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 519.518719] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 519.545808] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 519.565592] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 519.573093] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 519.599496] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 519.612162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 519.621855] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 519.659641] device hsr_slave_0 entered promiscuous mode [ 519.666111] device hsr_slave_1 entered promiscuous mode [ 519.681443] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 519.691698] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 519.845326] bridge0: port 2(bridge_slave_1) entered blocking state [ 519.851811] bridge0: port 2(bridge_slave_1) entered forwarding state [ 519.858607] bridge0: port 1(bridge_slave_0) entered blocking state [ 519.865015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 519.944676] 8021q: adding VLAN 0 to HW filter on device bond0 [ 519.961967] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 519.981898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 519.993878] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.010327] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.025702] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 520.042674] 8021q: adding VLAN 0 to HW filter on device team0 [ 520.078135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 520.095414] bridge0: port 1(bridge_slave_0) entered blocking state [ 520.101814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 520.134106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 520.143120] bridge0: port 2(bridge_slave_1) entered blocking state [ 520.149719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 520.165290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 520.175140] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 520.187071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 520.194477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 520.203208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 520.214285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 520.226807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 520.235086] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 520.248279] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 520.262804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 520.276192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 520.291107] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 520.299791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 520.324272] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 520.340168] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 520.352643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 520.362820] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 520.379625] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 520.398332] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 520.409619] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 520.417438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 520.425523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 520.490642] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 520.503581] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 520.511070] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 520.522651] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 520.531221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 520.539586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 520.548996] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 520.556176] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 520.569039] device veth0_vlan entered promiscuous mode [ 520.578760] device veth1_vlan entered promiscuous mode [ 520.584986] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 520.595788] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 520.609399] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 520.620177] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 520.627472] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 520.634967] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 520.643672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 520.652030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 520.663507] device veth0_macvtap entered promiscuous mode [ 520.670320] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 520.680429] device veth1_macvtap entered promiscuous mode [ 520.687895] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 520.697354] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 520.707679] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 520.716941] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 520.726981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 520.736089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 520.745978] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 520.755744] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 520.765558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 520.775725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 520.785938] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 520.795274] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 520.805192] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 520.815301] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 520.823241] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 520.831270] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 520.838938] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 520.846269] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 520.854593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 520.865391] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 520.876162] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 520.885965] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 520.896261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 520.905955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 520.916202] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 520.926186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 520.936986] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 520.946098] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 520.956939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 520.967742] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 520.974654] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 520.981888] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 520.990173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 521.130383] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 521.145278] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 521.171075] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 521.190504] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 521.201292] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 521.210998] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 521.218798] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 521.225704] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 521.233248] Bluetooth: hci1: command 0x040f tx timeout [ 523.261638] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 523.269058] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 523.276990] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 523.284345] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 523.292791] device bridge_slave_1 left promiscuous mode [ 523.298462] bridge0: port 2(bridge_slave_1) entered disabled state [ 523.305690] device bridge_slave_0 left promiscuous mode [ 523.312075] bridge0: port 1(bridge_slave_0) entered disabled state [ 523.321874] device veth1_macvtap left promiscuous mode [ 523.327475] device veth0_macvtap left promiscuous mode [ 523.332849] device veth1_vlan left promiscuous mode [ 523.338084] device veth0_vlan left promiscuous mode [ 525.792236] Bluetooth: hci1: command 0x0409 tx timeout [ 527.802260] device hsr_slave_1 left promiscuous mode [ 527.811743] device hsr_slave_0 left promiscuous mode [ 527.824921] team0 (unregistering): Port device team_slave_1 removed [ 527.839663] team0 (unregistering): Port device team_slave_0 removed [ 527.851754] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 527.861816] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 527.869046] Bluetooth: hci1: command 0x041b tx timeout [ 527.898707] bond0 (unregistering): Released all slaves [ 527.915027] IPVS: ftp: loaded support on port[0] = 21 [ 528.025025] chnl_net:caif_netlink_parms(): no params data found [ 528.131871] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.140060] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.148877] device bridge_slave_0 entered promiscuous mode [ 528.150656] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.161449] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.169312] device bridge_slave_1 entered promiscuous mode [ 528.195262] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 528.205535] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 528.230390] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 528.238917] team0: Port device team_slave_0 added [ 528.245464] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 528.253852] team0: Port device team_slave_1 added [ 528.276863] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 528.283477] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 528.309622] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 528.322549] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 528.329836] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 528.357166] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 528.374724] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 528.384752] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 528.423693] device hsr_slave_0 entered promiscuous mode [ 528.430026] device hsr_slave_1 entered promiscuous mode [ 528.436442] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 528.445727] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 528.554612] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.561060] bridge0: port 2(bridge_slave_1) entered forwarding state [ 528.567815] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.574218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.653101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 528.674156] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 528.691429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 528.704135] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.714388] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.733787] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 528.744646] 8021q: adding VLAN 0 to HW filter on device team0 [ 528.766761] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 528.776492] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.783380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 528.820278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 528.834037] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.840542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 528.869936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 528.888767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 528.897462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 528.925830] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 528.937021] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 528.943534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 528.952715] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 528.962365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 528.979886] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 528.989381] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 528.995667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 529.004214] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 529.017547] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 529.036251] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 529.046921] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 529.055931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 529.071183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 529.132751] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 529.141125] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 529.149112] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 529.160452] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 529.170082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 529.183217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 529.194455] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 529.206350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 529.218964] device veth0_vlan entered promiscuous mode [ 529.237258] device veth1_vlan entered promiscuous mode [ 529.244007] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 529.255903] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 529.272736] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 529.283694] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 529.295619] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 529.303965] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 529.312111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 529.320778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 529.332398] device veth0_macvtap entered promiscuous mode [ 529.339872] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 529.350636] device veth1_macvtap entered promiscuous mode [ 529.357177] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 529.367791] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 529.381995] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 529.392824] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 529.403813] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 529.413697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 529.424028] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 529.434149] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 529.444571] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 529.454553] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 529.464862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 529.475791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 529.485621] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 529.495857] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 529.503615] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 529.511415] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 529.519787] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 529.526853] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 529.535969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 529.546711] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 529.556712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 529.566017] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 529.576229] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 529.585697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 529.595855] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 529.605147] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 529.614972] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 529.624163] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 529.634121] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 529.644554] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 529.651779] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 529.659148] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 529.667800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 529.795218] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 529.816063] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 529.836706] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 529.853503] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 529.861101] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 529.879459] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 529.886822] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 529.897626] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 529.948527] Bluetooth: hci1: command 0x040f tx timeout [ 531.918716] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 531.925465] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 531.935195] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 531.943049] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 531.953302] device bridge_slave_1 left promiscuous mode [ 531.959379] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.966579] device bridge_slave_0 left promiscuous mode [ 531.973566] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.984164] device veth1_macvtap left promiscuous mode [ 531.989636] device veth0_macvtap left promiscuous mode [ 531.994954] device veth1_vlan left promiscuous mode [ 532.000095] device veth0_vlan left promiscuous mode [ 534.669064] Bluetooth: hci1: command 0x0409 tx timeout [ 536.446946] device hsr_slave_1 left promiscuous mode [ 536.454681] device hsr_slave_0 left promiscuous mode [ 536.471678] team0 (unregistering): Port device team_slave_1 removed [ 536.481995] team0 (unregistering): Port device team_slave_0 removed [ 536.492568] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 536.504084] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 536.534843] bond0 (unregistering): Released all slaves [ 536.552339] IPVS: ftp: loaded support on port[0] = 21 [ 536.665885] chnl_net:caif_netlink_parms(): no params data found [ 536.749770] Bluetooth: hci1: command 0x041b tx timeout [ 536.767518] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.775151] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.788538] device bridge_slave_0 entered promiscuous mode [ 536.797739] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.810918] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.818685] device bridge_slave_1 entered promiscuous mode [ 536.864249] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 536.875270] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 536.916680] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 536.929172] team0: Port device team_slave_0 added [ 536.936544] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 536.949160] team0: Port device team_slave_1 added [ 536.986170] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 536.994084] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 537.027599] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 537.040436] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 537.046890] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 537.074426] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 537.086091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 537.094292] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 537.120543] device hsr_slave_0 entered promiscuous mode [ 537.126916] device hsr_slave_1 entered promiscuous mode [ 537.134135] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 537.142466] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 537.252506] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.258957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 537.265745] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.272274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.328078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 537.338889] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 537.356692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 537.366309] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.374811] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.395744] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 537.402412] 8021q: adding VLAN 0 to HW filter on device team0 [ 537.415768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 537.424326] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.430770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.474546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 537.488561] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.495160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 537.511184] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 537.537618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 537.546002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 537.562201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 537.574275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 537.598715] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 537.607983] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 537.641222] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 537.648086] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 537.683759] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 537.701778] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 537.713848] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 537.721523] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 537.730575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 537.816835] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 537.824466] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 537.831902] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 537.842691] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 537.849366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 537.858405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 537.867339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 537.874808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 537.888549] device veth0_vlan entered promiscuous mode [ 537.907717] device veth1_vlan entered promiscuous mode [ 537.915965] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 537.934938] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 537.953773] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 537.964424] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 537.971743] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 537.979159] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 537.987320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 537.995550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 538.005298] device veth0_macvtap entered promiscuous mode [ 538.012096] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 538.021567] device veth1_macvtap entered promiscuous mode [ 538.027711] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 538.038382] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 538.048264] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 538.057349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 538.067178] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 538.077889] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 538.088082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 538.097336] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 538.107141] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 538.116430] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 538.127071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 538.136280] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 538.146111] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 538.156694] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 538.164337] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 538.172317] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 538.183421] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 538.191171] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 538.198930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 538.211681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 538.221603] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 538.232801] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 538.242712] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 538.252296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 538.262142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 538.271327] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 538.281265] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 538.290460] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 538.300465] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 538.311044] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 538.317947] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 538.326401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 538.334713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 538.469673] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 538.478467] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 538.496290] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 538.514308] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 538.522303] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 538.536908] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 538.544866] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 538.558833] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 540.648395] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 540.655556] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 540.666059] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 540.673739] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 540.682667] device bridge_slave_1 left promiscuous mode [ 540.688796] bridge0: port 2(bridge_slave_1) entered disabled state [ 540.696860] device bridge_slave_0 left promiscuous mode [ 540.702688] bridge0: port 1(bridge_slave_0) entered disabled state [ 540.712909] device veth1_macvtap left promiscuous mode [ 540.718218] device veth0_macvtap left promiscuous mode [ 540.723878] device veth1_vlan left promiscuous mode [ 540.728930] device veth0_vlan left promiscuous mode [ 543.151141] Bluetooth: hci1: command 0x0409 tx timeout [ 545.170505] device hsr_slave_1 left promiscuous mode [ 545.178305] device hsr_slave_0 left promiscuous mode [ 545.191238] team0 (unregistering): Port device team_slave_1 removed [ 545.205183] team0 (unregistering): Port device team_slave_0 removed [ 545.216890] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 545.227379] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 545.231670] Bluetooth: hci1: command 0x041b tx timeout [ 545.264787] bond0 (unregistering): Released all slaves [ 545.280137] IPVS: ftp: loaded support on port[0] = 21 [ 545.386958] chnl_net:caif_netlink_parms(): no params data found [ 545.490872] bridge0: port 1(bridge_slave_0) entered blocking state [ 545.499537] bridge0: port 1(bridge_slave_0) entered disabled state [ 545.514839] device bridge_slave_0 entered promiscuous mode [ 545.527502] bridge0: port 2(bridge_slave_1) entered blocking state [ 545.535819] bridge0: port 2(bridge_slave_1) entered disabled state [ 545.548481] device bridge_slave_1 entered promiscuous mode [ 545.589650] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 545.601564] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 545.643632] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 545.657756] team0: Port device team_slave_0 added [ 545.664950] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 545.678558] team0: Port device team_slave_1 added [ 545.709322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 545.721358] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 545.753487] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 545.771183] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 545.780619] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 545.813728] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 545.829528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 545.840146] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 545.879513] device hsr_slave_0 entered promiscuous mode [ 545.889548] device hsr_slave_1 entered promiscuous mode [ 545.899201] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 545.911576] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 546.011457] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.017895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 546.024626] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.031009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 546.081532] 8021q: adding VLAN 0 to HW filter on device bond0 [ 546.092811] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 546.105155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 546.114832] bridge0: port 1(bridge_slave_0) entered disabled state [ 546.132598] bridge0: port 2(bridge_slave_1) entered disabled state [ 546.144876] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 546.150971] 8021q: adding VLAN 0 to HW filter on device team0 [ 546.178294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 546.186850] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.193291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 546.213797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 546.221577] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.228039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 546.250962] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 546.262174] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 546.273938] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 546.282473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 546.290662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 546.300467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 546.310598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 546.327707] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 546.334366] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 546.341703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 546.351627] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 546.364708] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 546.372660] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 546.379448] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 546.394418] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 546.409690] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 546.418040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 546.426878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 546.502294] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 546.509869] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 546.518357] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 546.529408] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 546.537134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 546.545699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 546.556639] device veth0_vlan entered promiscuous mode [ 546.565566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 546.574217] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 546.587354] device veth1_vlan entered promiscuous mode [ 546.594234] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 546.606044] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 546.620856] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 546.633322] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 546.640242] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 546.648619] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 546.656774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 546.665439] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 546.676200] device veth0_macvtap entered promiscuous mode [ 546.684656] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 546.696028] device veth1_macvtap entered promiscuous mode [ 546.702932] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 546.714600] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 546.725522] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 546.735300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 546.745401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 546.755104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 546.764924] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 546.774144] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 546.783961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 546.793205] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 546.803107] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 546.813167] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 546.823002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 546.833591] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 546.840530] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 546.847788] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 546.855275] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 546.862977] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 546.870773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 546.881767] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 546.895865] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 546.905422] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 546.915313] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 546.924615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 546.934421] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 546.943600] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 546.953448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 546.962615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 546.972406] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 546.982822] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 546.990633] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 546.997679] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 547.005805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 547.143720] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 547.150987] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 547.176194] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 547.180499] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 547.197292] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 547.197320] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 547.217495] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 547.229228] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 549.252312] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 549.259425] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 549.268102] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 549.275274] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 549.283909] device bridge_slave_1 left promiscuous mode [ 549.289691] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.297928] device bridge_slave_0 left promiscuous mode [ 549.303850] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.314121] device veth1_macvtap left promiscuous mode [ 549.319470] device veth0_macvtap left promiscuous mode [ 549.324950] device veth1_vlan left promiscuous mode [ 549.330005] device veth0_vlan left promiscuous mode [ 551.793322] Bluetooth: hci1: command 0x0409 tx timeout [ 553.768603] device hsr_slave_1 left promiscuous mode [ 553.778264] device hsr_slave_0 left promiscuous mode [ 553.791159] team0 (unregistering): Port device team_slave_1 removed [ 553.804344] team0 (unregistering): Port device team_slave_0 removed [ 553.814801] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 553.827195] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 553.859047] bond0 (unregistering): Released all slaves [ 553.873354] IPVS: ftp: loaded support on port[0] = 21 [ 553.882374] Bluetooth: hci1: command 0x041b tx timeout [ 553.983583] chnl_net:caif_netlink_parms(): no params data found [ 554.068346] bridge0: port 1(bridge_slave_0) entered blocking state [ 554.075674] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.083265] device bridge_slave_0 entered promiscuous mode [ 554.091086] bridge0: port 2(bridge_slave_1) entered blocking state [ 554.097976] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.106584] device bridge_slave_1 entered promiscuous mode [ 554.143025] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 554.153667] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 554.180134] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 554.188758] team0: Port device team_slave_0 added [ 554.196343] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 554.204410] team0: Port device team_slave_1 added [ 554.227062] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 554.233329] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 554.259987] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 554.275018] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 554.281274] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 554.307061] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 554.318636] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 554.326847] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 554.354109] device hsr_slave_0 entered promiscuous mode [ 554.361797] device hsr_slave_1 entered promiscuous mode [ 554.370477] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 554.378113] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 554.532754] bridge0: port 2(bridge_slave_1) entered blocking state [ 554.539189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 554.545990] bridge0: port 1(bridge_slave_0) entered blocking state [ 554.552380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 554.617028] 8021q: adding VLAN 0 to HW filter on device bond0 [ 554.627692] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 554.642890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 554.651573] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.665921] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.688549] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 554.700495] 8021q: adding VLAN 0 to HW filter on device team0 [ 554.712158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 554.726427] bridge0: port 1(bridge_slave_0) entered blocking state [ 554.732822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 554.758438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 554.766435] bridge0: port 2(bridge_slave_1) entered blocking state [ 554.772801] bridge0: port 2(bridge_slave_1) entered forwarding state [ 554.805273] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 554.813427] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 554.839173] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 554.851687] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 554.870589] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 554.879225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 554.893641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 554.902859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 554.926988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 554.938563] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 554.950744] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 554.960979] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 554.971753] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 554.994045] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 555.023745] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 555.038979] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 555.052211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 555.062933] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 555.136084] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 555.143340] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 555.150910] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 555.162045] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 555.170454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 555.178404] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 555.188397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 555.195895] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 555.205630] device veth0_vlan entered promiscuous mode [ 555.218176] device veth1_vlan entered promiscuous mode [ 555.225917] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 555.236464] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 555.251242] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 555.261671] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 555.269877] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 555.278779] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 555.288316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 555.297378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 555.308440] device veth0_macvtap entered promiscuous mode [ 555.315769] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 555.326943] device veth1_macvtap entered promiscuous mode [ 555.333411] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 555.343071] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 555.353484] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 555.365338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 555.375580] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.385088] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 555.397210] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.406465] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 555.416280] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.426257] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 555.436082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.445272] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 555.455114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.465461] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 555.472386] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 555.480767] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 555.491023] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 555.498707] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 555.507094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 555.518913] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 555.529468] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.538776] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 555.548786] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.558340] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 555.568135] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.577333] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 555.587134] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.596685] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 555.606515] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 555.617601] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 555.625005] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 555.631859] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 555.641104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 555.776725] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 555.784820] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 555.791941] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 555.805731] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 555.812293] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 555.830604] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 555.840735] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 555.852606] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 557.903762] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 557.910567] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 557.920291] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 557.927592] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 557.936057] device bridge_slave_1 left promiscuous mode [ 557.941518] bridge0: port 2(bridge_slave_1) entered disabled state [ 557.950413] device bridge_slave_0 left promiscuous mode [ 557.956697] bridge0: port 1(bridge_slave_0) entered disabled state [ 557.966766] device veth1_macvtap left promiscuous mode [ 557.972067] device veth0_macvtap left promiscuous mode [ 557.977862] device veth1_vlan left promiscuous mode [ 557.982915] device veth0_vlan left promiscuous mode [ 560.595755] Bluetooth: hci1: command 0x0409 tx timeout [ 562.404845] device hsr_slave_1 left promiscuous mode [ 562.412821] device hsr_slave_0 left promiscuous mode [ 562.425461] team0 (unregistering): Port device team_slave_1 removed [ 562.439322] team0 (unregistering): Port device team_slave_0 removed [ 562.452050] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 562.463272] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 562.494812] bond0 (unregistering): Released all slaves [ 562.512271] IPVS: ftp: loaded support on port[0] = 21 [ 562.618956] chnl_net:caif_netlink_parms(): no params data found [ 562.686208] Bluetooth: hci1: command 0x041b tx timeout [ 562.739056] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.745759] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.753940] device bridge_slave_0 entered promiscuous mode [ 562.762022] bridge0: port 2(bridge_slave_1) entered blocking state [ 562.769196] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.777304] device bridge_slave_1 entered promiscuous mode [ 562.802587] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 562.812933] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 562.842524] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 562.850912] team0: Port device team_slave_0 added [ 562.857353] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 562.865033] team0: Port device team_slave_1 added [ 562.894152] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 562.900952] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 562.927493] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 562.940098] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 562.946907] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 562.972842] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 562.984327] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 562.992385] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 563.023215] device hsr_slave_0 entered promiscuous mode [ 563.034922] device hsr_slave_1 entered promiscuous mode [ 563.043157] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 563.051186] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 563.197557] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.203960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 563.210790] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.217214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 563.281507] 8021q: adding VLAN 0 to HW filter on device bond0 [ 563.291380] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 563.305437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 563.314480] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.324632] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.342863] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 563.349367] 8021q: adding VLAN 0 to HW filter on device team0 [ 563.360606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 563.369633] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.376087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 563.396710] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 563.404448] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.410871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 563.432121] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 563.441642] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 563.463949] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 563.474828] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 563.492465] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 563.500481] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 563.514792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 563.523759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 563.545849] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 563.553359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 563.563973] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 563.571461] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 563.582032] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 563.612362] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 563.644677] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 563.662401] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 563.669545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 563.685243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 563.750139] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 563.764010] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 563.771878] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 563.790918] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 563.803488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 563.812347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 563.828627] device veth0_vlan entered promiscuous mode [ 563.842485] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 563.850453] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 563.864557] device veth1_vlan entered promiscuous mode [ 563.870626] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 563.880918] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 563.897053] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 563.907706] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 563.914580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 563.923413] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 563.931319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 563.939580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 563.950032] device veth0_macvtap entered promiscuous mode [ 563.962334] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 563.973122] device veth1_macvtap entered promiscuous mode [ 563.980691] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 563.991827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 564.002181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 564.011399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 564.021841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 564.031035] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 564.038336] ieee802154 phy0 wpan0: encryption failed: -22 [ 564.043644] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 564.046362] ieee802154 phy1 wpan1: encryption failed: -22 [ 564.055435] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 564.071109] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 564.080842] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 564.090692] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 564.100733] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 564.112642] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 564.123395] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 564.130882] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 564.138442] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 564.146480] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 564.153596] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 564.161554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 564.171919] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 564.182208] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 564.191829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 564.203937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 564.213142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 564.222929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 564.232097] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 564.241899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 564.251120] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 564.260929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 564.271324] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 564.278435] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 564.286460] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 564.294406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 564.435096] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 564.447798] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 564.454943] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 564.490096] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 564.505541] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 564.513018] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 564.521668] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 564.528729] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 2021/02/27 04:32:20 executor 1 failed 11 times: executor 1: exit status 67 running=-1 collide=0 completed=2 flag_threaded=1 flag_collide=1 current=0 th # 0: created=1 executing=0 colliding=0 ready=0 done=1 call_index=1 res=0 reserrno=14 th # 1: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 2: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 3: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 4: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 5: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 6: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 7: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 8: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 9: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #10: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #11: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #12: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #13: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #14: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #15: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 SYZFAIL: negative running (errno 11: Resource temporarily unavailable) SYZFAIL: child failed (errno 0: Success) loop exited with status 67