q\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000000)=0x1, 0x4) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:29 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:29 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x101080, 0x0) lseek(r0, 0x80000000007, 0x6) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x2, 0x0) 13:42:29 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r1 = socket$netlink(0x10, 0x3, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="93b20000000000000000010000000000000001410000001c001700020000eeffffff6575683a73"], 0x38}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000003}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1c, r3, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x220000c1}, 0x20004000) [ 2388.696439][T29725] tipc: Enabling of bearer rejected, media not registered [ 2388.756263][T29742] tipc: Enabling of bearer rejected, media not registered 13:42:29 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000703000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000000)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:29 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r3, 0x1) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000000c0)={r5, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={r5, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x36}}}}, &(0x7f00000000c0)=0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r6, 0xfffffff8}, 0x8) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r7, 0x2000000000, 0x0) 13:42:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xec5c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000000)='/dev/ashmem\x00', &(0x7f0000000240)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c', 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r3, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) fdatasync(r4) 13:42:29 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x803, 0x0) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r4, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, r5, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0xf}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="54000000c240000000002a763ecaf1f53b86d41023106aceae7dce90397ed6cb570cb4ec03f0472e0ca788c6fa0cd5ad5b2da1256accb3f48218f23fb73434c4800e65ca666e5e50827589f87f255b49cd51d9644bec145511482319aab1a3ff88517a040f92d61b555be814435ae9a833e13f7ebdbee3465fca74b8db0ae70c664bf91686f532ea628f1b9af41cdd63131970dc5a5f90337595", @ANYRES16=r5, @ANYBLOB="02002dbd7000fddbdf25060000000500010001000000080005007f0000011400030000000000000000000000ffff0014143714000200fc01000000000000000000000000000008000400ac1414aa"], 0x54}, 0x1, 0x0, 0x0, 0x4008000}, 0x40008c0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, r5, 0x100, 0x70bd25, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x23}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_hsr\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 13:42:30 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:30 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r3, 0x8004551a, 0x0) ioctl$FS_IOC_GETVERSION(r3, 0x80087601, &(0x7f0000000040)) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:30 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socket$inet6_mptcp(0xa, 0x1, 0x106) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, &(0x7f0000000040)={0x73, 0x3, [], [@pad1, @ra={0x5, 0x2, 0x8000}, @enc_lim={0x4, 0x1, 0x4}, @generic={0x0, 0xa, "f7e9b03822a3414a4c7e"}, @padn={0x1, 0x1, [0x0]}]}, 0x28) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000000)=0x1a, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:30 executing program 1 (fault-call:6 fault-nth:0): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xed5c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:30 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:30 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f0000000000)={0xb, 0xa3fe, 0x3f}) 13:42:30 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) rt_sigsuspend(&(0x7f0000000000)={[0x8000]}, 0x8) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000040)) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xces\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x00\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\x1c\xa0\x9e^\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11k\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') 13:42:30 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x402a00, 0x0) prctl$PR_MCE_KILL_GET(0x22) ioctl$HIDIOCGRAWPHYS(0xffffffffffffffff, 0x80404805, &(0x7f00000001c0)) r2 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r2, 0x0) r3 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f00000002c0)="02e6cc3c903df9f94deaff30edaaa614641d30298e44edccc15e3a93e5ecd99c698c7bf57511694705e79053e6f01e48fb15668a4f63b287ee67b04aea5c46c3d31dddcb6eaa7db71a5981353806276fec3c21df1fa3b9635e3f1adbaf278f676467de319d5fd72116d4801cfd6d87d30e682c23a4a5e46052822635b6ab94f79149604ae6a26091d5b27b08f95973db0c58eccfaae9316e18a1fe013689a46807277c60819084af954cd1f9e257852b6e993b964cceb43449a3b4d4ead451057cf4d6b6261f871eb6fda3be9d365dabef800ec9f6861d9fffd949afca41", 0xde, r2) keyctl$setperm(0x5, r3, 0x242204) write$dsp(r1, &(0x7f0000000040)="a0c68bc31259e9657be146a58754993988a428bbd1bcca774f173e0f688e674a8c56c18d912202ecf45c329debe3af85eaaaee3bdac50abb38cc1ff8d775ae1b882c02b900e63910538943ad1d77be3d796f9be8f9f30da0a641f16af9442be11352030c015dae5a160a55", 0x6b) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x200181, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000180)={0x2, 0x1b, 0x1, 0x4, 0x1, 0x9, 0x5, 0xba, 0x1}) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[0x7fff, 0x7196, 0xffff]}) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x3) 13:42:30 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:30 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x684940, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(r3, 0x7002) 13:42:30 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xee5c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:31 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$IMGETVERSION(r9, 0x80044942, &(0x7f0000000080)) lseek(r0, 0x0, 0x0) 13:42:31 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$l2tp(r3, &(0x7f0000000000)="e22c63bbc080d107ae1d5cd125b0eeaeccc356ffb41eb395076f33bf7eb79361a5a5e31b9b470a4bf87f471ae2d701f8fc9c6e35b9f15a7700c022cd14287997fcf39d14f00759fff85ce9540c212002338b0d4d358e9aae3ff01406a45a908b935529839c6c6ed25e19fc8f0aea831a59c56dd059ee253bf8bf8d4512852c59", 0x80, 0x4000c, &(0x7f0000000180)={0x2, 0x0, @remote, 0x2}, 0x10) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:31 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x7fffffffffffffff, 0x0) 13:42:31 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xef5c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:31 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, &(0x7f00000000c0)={0x3, 0x0, 0x44f, 0x7, 0x6, 0x4}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+'}, 0x16, 0x1) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x202000, 0x0) sched_yield() lseek(r0, 0x0, 0x0) 13:42:31 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:31 executing program 0: ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0x9b0000, 0xfe000000, 0x2, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x990a94, 0x5b0e, [], @value=0x8}}) write$tun(r0, &(0x7f0000000240)={@void, @void, @ipv4=@tipc={{0x2c, 0x4, 0x0, 0x9, 0xd3, 0x68, 0x0, 0x90, 0x6, 0x0, @dev={0xac, 0x14, 0x14, 0x41}, @rand_addr=0x64010101, {[@cipso={0x86, 0x22, 0x3, [{0x0, 0xe, "9d2b09834e86b48a393f2b82"}, {0x5, 0xe, "d4947b2cf4c5a047ebbe3f27"}]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x24, 0x47, 0x3, 0x2, [{@empty, 0x800}, {@broadcast, 0x3}, {@rand_addr=0x64010102, 0x9}, {@multicast2, 0x80000001}]}, @rr={0x7, 0xb, 0x26, [@empty, @remote]}, @lsrr={0x83, 0x7, 0x19, [@broadcast]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x2b, 0xd5, [@loopback, @dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, @local, @multicast1, @multicast2, @rand_addr=0x64010102, @remote, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x44, 0x8, 0xdb, 0x0, 0x1, [0x800]}, @generic={0x94, 0x8, "6f5baedfbea0"}]}}, @payload_direct={{{{0x23, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x2, 0x7554, 0x0, 0x3, 0x0, 0x3, 0x3, 0x1f, 0x401, 0x3, 0x4e21, 0x4e24}, 0x2, 0x1}}, [0x0, 0x0, 0x0]}}}, 0xd3) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r1, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:31 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf05c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)='/dev/ashmem\x00\x9eo\x9bq\xe6\xea\xdd\xd7e\r^\xb8A\rJrx\xe4.\x1c\x88\x01\xe7V\x98\xdeE\x80\x1b.y\x02\xde\x82\xa5]\xdb\xbd\xc6\x9beL$\xd7\xed_\xd4\x98i\xbf5}^\xf8\x9f,\xb7\vo{iL1:f\xffL:\x9c\x8a5\xb4\xe4\x16\xd4\xb1`p\xdf\b\xf3M\x81p\xf2b`j\xc0\x81\x80\xa8\xce\x91t,\x80N\xb3\x0eT,m/i\xea\xd9\xe5\xa1y\x138\\J\xd6\xfb\xe7/\xa8\ni\'\xe6\xae\xa7\xd5\x10\"\xe9\x97\x82R\xc62A\xaf\x04\xcf:\x95\f?\x00'/169, 0xa9, 0x1) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CHECK_EXTENSION_VM(r4, 0xae03, 0x1c31) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000)=0xda, 0x4) 13:42:31 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x3) 13:42:31 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:31 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:31 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r1 = gettid() tkill(r1, 0x1004000000013) process_vm_writev(r1, &(0x7f0000001940)=[{&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000000000)=""/116, 0x74}, {&(0x7f0000000080)=""/121, 0x79}, {&(0x7f0000000100)=""/247, 0xf7}, {&(0x7f0000000240)=""/170, 0xaa}, {&(0x7f0000000300)=""/15, 0xf}, {&(0x7f0000001840)=""/194, 0xc2}, {&(0x7f0000000340)=""/57, 0x39}], 0x8, &(0x7f0000003d00)=[{&(0x7f00000019c0)=""/9, 0x9}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/141, 0x8d}, {&(0x7f0000002ac0)=""/177, 0xb1}, {&(0x7f0000002b80)=""/201, 0xc9}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/97, 0x61}], 0x7, 0x0) 13:42:31 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETTRIGGER(r3, 0x80045010, &(0x7f0000000000)) 13:42:31 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:32 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x4) 13:42:32 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2c2, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180)='l2tp\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x58, r2, 0x422, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xc0b}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0x28}}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x58}, 0x1, 0x0, 0x0, 0x24004845}, 0x4800) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:32 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$MON_IOCX_GET(r3, 0x40189206, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/23, 0x17}) 13:42:32 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:32 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x300) 13:42:32 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r0, 0x8004551a, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) 13:42:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf15c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:32 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x2000008, 0x12, r0, 0x10352000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000000)={r6, 0x75, "b1aa9d304d341374e6c340285537f1961b5b5f46a4bbac2b0a910aa13ca178301d5f95b5b3a08e673e422be8bb84d2e32cf88d7c1c7951b2e54f95809cfad16f762b24485af5b168ef1681bb8606683d25b13314dfb91c91d2c3b7b7b44d137b78268117a04dec518a0fe905933860f4a18f27f8b0"}, &(0x7f0000000180)=0x7d) 13:42:34 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x1000000) 13:42:34 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:34 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80080, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000240)=""/4096) 13:42:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf25c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:34 executing program 3: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000040)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\x00@\x00\x00\xad\xd0\xd0\xee\x9c\x96\x1c\xcd[\xe6\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c`pT\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdbX\x90`L\f]\xf95\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xcaR(B\xc4W\xe2t\xb3\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:34 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x810, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @sack_perm, @sack_perm, @window={0x3, 0x4, 0x3}], 0x4) 13:42:35 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x0, 'vlan1\x00', {}, 0x1c0}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000840)={0x2, 0x0, @ioapic={0x4000, 0x641, 0x8000, 0x38aa, 0x0, [{0xf9, 0x4, 0x3f}, {0x1f, 0x1, 0x6, [], 0x1}, {0x3, 0x1f, 0x7, [], 0x2}, {0x4, 0x7, 0x9, [], 0x7}, {0x1, 0x1f, 0x8, [], 0xb8}, {0x5c, 0x7, 0xa9, [], 0xe5}, {0x2, 0x3, 0x9, [], 0x2}, {0x4, 0x6, 0xd7, [], 0x3f}, {0x1, 0xff, 0x2d, [], 0x96}, {0xff, 0x4, 0x7, [], 0x6}, {0x9, 0x7, 0x7, [], 0x2}, {0x81, 0xe0, 0x4}, {0x3, 0xbd, 0xa6, [], 0xde}, {0x1f, 0x0, 0x1}, {0x0, 0x61, 0x9, [], 0xbe}, {0x20, 0x81, 0xae, [], 0x9}, {0x2, 0x1f, 0x3f, [], 0xf2}, {0x0, 0x0, 0x2, [], 0x9}, {0x5, 0x7, 0x6b, [], 0x1}, {0x52, 0x7, 0x2, [], 0x80}, {0x8, 0x67, 0x8, [], 0x98}, {0x2, 0xfb, 0x3f, [], 0xec}, {0x3f, 0x2, 0x6, [], 0x7f}, {0x3, 0x2, 0x8, [], 0x40}]}}) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') 13:42:35 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2000000) 13:42:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf35c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:35 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x430400, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x50, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x400000, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r0, 0x8004551a, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000000)="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") 13:42:35 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x100413, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') 13:42:35 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x3000000) 13:42:35 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/dev_snmp6\x00') r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = dup3(r2, r1, 0x0) ioctl$KDSIGACCEPT(r3, 0x5608, 0x200) syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00') ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000000)={0x800, 0x0, [], {0x0, @bt={0x0, 0x1, 0x0, 0x3, 0x400, 0x34, 0xe026, 0x80, 0x97d9, 0x1, 0x6, 0x2662, 0x6, 0x3, 0x0, 0x1e, {0x0, 0x5aa4}, 0x2, 0x89}}}) 13:42:35 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) recvmmsg(r1, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000040)=0x1c) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf45c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:35 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x4000000) 13:42:35 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0xa0a01, 0x0) lseek(r0, 0x0, 0x0) 13:42:35 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:35 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x100000000000000) 13:42:36 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x82, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400c00, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000840)={0x2c8, 0x33, 0x8, 0x70bd27, 0x25dfdbfb, {0x13}, [@generic="1e0b018f27868fc51579d24cd63eae707f2ad2f315d787e02b58f2037234b73648cb65a9d82af34b4725e548", @generic, @nested={0x11b, 0x72, 0x0, 0x1, [@generic="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", @typed={0x4, 0x41}, @typed={0x14, 0x58, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, @generic="86ccf070a97100c3a0fc9bd50a9f752ad36ac6a471edd840fac90ad2916bc6e4e26f8fd4b2487ee1b5b840b7277eecda594e879de3cdbe96bfcbc2c75405461b8daf3e5d5393d9d1bef3e7a89576fd7685d1487b3caff46f0cefddabbe54f587db3d3178d17ced3a96d6929f8c6aa1589316b696065926b15aed7c5f82ad7b257ae13479c23afd66946cc391fcd0ba5757e26442b75886d0cda491bd32dc189aa0905ecf79683f08bc177d8c792d835a0a87fe5a7b80ff9185a7192206f594567f764d5002114f05554885baa0a40e033559625183d63bc3fbb5602d8719ae0ed5bab429cef8be82703d5ff4", @nested={0x75, 0x11, 0x0, 0x1, [@generic="8d5a04be3074485ae5c382c71cfb4ea6261a267d4939c82b353d6f9a7c64169b28dcc62dfca2e85e8ba00e70d796b06aed1552f876b34958bdf28de66ccc9ae396f037b66e", @typed={0x14, 0x1d, 0x0, 0x0, @ipv6=@mcast2}, @typed={0x14, 0x68, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0x4, 0x7e}]}, @typed={0x8, 0x6, 0x0, 0x0, @ipv4=@empty}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x4}, 0x4) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:36 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:36 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$cgroup_type(r7, &(0x7f0000000380)='threaded\x00', 0x9) r8 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_S_HW_FREQ_SEEK(r8, 0x40305652, &(0x7f0000000340)={0x80000000, 0x0, 0x3, 0x6, 0xd3, 0x4, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r9 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x644800, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r9, 0x80386433, &(0x7f0000000040)=""/115) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7a, 0x7a, 0x5, [@datasec={0x9, 0x4, 0x0, 0xf, 0x2, [{0x2, 0x9, 0x3f}, {0x1, 0xfb, 0x800}, {0x5, 0x5, 0x208}, {0x401, 0x40, 0x2}], "5786"}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0xa7}}, @volatile={0x9, 0x0, 0x0, 0x9, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x7fff}}]}, {0x0, [0x2e, 0x30, 0x5f]}}, &(0x7f0000000240)=""/223, 0x99, 0xdf, 0x1}, 0x20) lseek(r10, 0x1c0, 0x4) 13:42:36 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:36 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000240)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbeuV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x87Q\xa1+\x95\xa2\x00\xf3\xa1\xabd\xba\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\x8f\xb3\xe7\x91a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\x84\xa3\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdb1E\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce\x02\x04\xc0V\xe1g\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5LYq\x83\x15O\xe9\xcb\xce\xa5\\\xdf\x81\xb1:\xf10\x11\xb0\xa4&\x06SMmR3\xe1Jav\xed\xea\x15\xf0\x15M\xff\x15S\xde\x93\x1b\x0f\x91;bCR\xe2\xe6') 13:42:36 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:36 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r0, 0x8004551a, 0x0) r1 = gettid() tkill(r1, 0x1004000000013) r2 = gettid() tkill(r2, 0x1004000000013) r3 = gettid() tkill(r3, 0x1004000000013) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = clone3(&(0x7f0000001240)={0x100000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x3e}, &(0x7f0000000240)=""/4096, 0x1000, &(0x7f0000000100)=""/102, &(0x7f0000000180)=[r1, r2, 0x0, r3, 0xffffffffffffffff], 0x5, {r6}}, 0x58) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x0, r7}) r8 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r8, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x40000, 0x0) 13:42:36 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x200000000000000) 13:42:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf55c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:36 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x3000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000000)=""/46) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:36 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, 0x0) 13:42:36 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x100, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r2, 0x3b70, &(0x7f0000000040)={0x18, 0x0, 0x0, 0xa53}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000980)=ANY=[@ANYBLOB="30000007dc10ca66e640cc26123b33086ef3da9095b7d9ca5bbeda6712d939c8840024000b0f000000050000000000000000987724f844d611dd194116dc816335aff624f0ea7c87c0e97cd26c45eddae2eb784600"/94, @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000007000100667100000400020014a99c8c29d8c21a9dd1405cd59e0a9da466477ed9c2d8c06a46b26d28ff535a5fc556338f953e17568423a7563e65e5029220f9bf5c674c257e25dbb5c8f78e88bf91f6ac3c9a11cbaaa418313cde865a5f3e940a5d1a97f6a4eb22034b6b08a53b90377fefff90faf8724951642bc7b51096d5deb28529362fe8d358a92f9e0556c79108211e9fa33f34e710bb1256be639a82c75d8433a22458"], 0x30}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000080)={'vxcan1\x00', r4}) r6 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f00000001c0)={'wg0\x00', {0x2, 0x4e22, @loopback}}) keyctl$set_timeout(0xf, r6, 0x0) add_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000240)="ea8924c55f870655f97772dd75723375ea7aa276939c5372063004a34ec08eb0b92a37210cf1c34fc2f377f3961165282cea0b5dbafb71421912b23a0d1ab7bb557fb64041731f6e03d0824a9e2c14a59cb137ea04a6a6e3cce001c9a1e6d4bc97a8f9f47b2cfca930ec7c8b9830bc504524345815e6057b5ce353c1d2ea07dfc2626113bac4a1acadadec44b90536d595f3cf9d94932e0451859fe9c010145cc9d82734c8aae738ae9171bc8eb94bfd68ff", 0xb2, r6) 13:42:36 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x300000000000000) 13:42:37 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, 0x0) 13:42:37 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x101202, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'xfrm0\x00', 0x1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) write$tun(r1, &(0x7f00000000c0)={@void, @val, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x32, 0x0, @empty, @broadcast}, @address_reply={0x16}}}, 0xfdef) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:37 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x400000000000000) 13:42:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf65c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:37 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x141, 0x0) accept$phonet_pipe(r1, &(0x7f0000000140), &(0x7f0000000180)=0x10) r2 = gettid() tkill(r2, 0x1004000000013) r3 = syz_open_procfs(r2, &(0x7f0000001880)='status\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}) sendmsg$AUDIT_TRIM(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f6, 0x8, 0x70bd2d, 0x25dfdbff, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:39 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 13:42:39 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, 0x0) 13:42:39 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$RDS_CONG_MONITOR(r8, 0x114, 0x6, &(0x7f0000000000), 0x4) r9 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) accept4$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r9, 0x8918, &(0x7f0000000080)={@private0, 0x65, r13}) lseek(r0, 0x4, 0x0) 13:42:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf75c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:39 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4$alg(r3, 0x0, 0x0, 0x80000) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xe6, 0x100) r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r5, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="e8020000", @ANYRES16=r6, @ANYBLOB="00082bbd7000fcdbdf25040000000800020003000000080002000200000094000c802c000b8008000a003da50000080009007e3ff97508000a004615000008000900f7fb1558080009009ca458301c000b800800090052c8d23908000a0038a1000008000a00dc1b000034000b8008000a00705e000008000a00414100000800090017537b5908000a005bf6000008000a00a121000008000900e9973b3c14000b8008000900dd24a55c08000a0064b60000a4000c804c000b80080009004079e87a08000900f130bf1308000900d412766f08000900578ee60708000900eeae09780800090006ec7b3a08000a00aedd000008000a009c3f000008000a00855c00001c000b800800090066571c010800090054b6c84c08000a003b8e00002c000b8008000a00f2ec0000080009004eb07748080009005853ad55080009003e73be0108000a00df8900000c000b8008000a00def500004c000c801c000b80080009007e71c97708000900733a362f08000a0001a000002c000b8008000900e3f94a23080009000e58950a08000a0070a8000008000a00c08e000008000a00ecfb0000100008800c00078008000600220000001c00048005000300060000000500030004000000050003000500000008000200030000000c0108802c0007800800050006c803120800050057d88f3908000600120000000800050038b05e0608000600520000001400078008000600d100000041d368ad0b7dfd08000600c20000003c000780080005003a85d607080006003800000008000600290000000800050070be9f06080005004589096e08000600d000000008000500e87c1177240007800800060081000000080005004c3ed73208000600d1000000080005001acaf41f3c000780080005008037fa0d08000500c581940d0800060044000000080006000700000008000500eb68b40d080005006be06d05080006005d0000002c00078008000500435150740800050069a142380800050088294f4508000600e300000008000500749d187c"], 0x2e8}, 0x1, 0x0, 0x0, 0x8005}, 0x2004c400) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x8, 0x100010, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r7 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r7, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(0xffffffffffffffff, 0x1) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, &(0x7f00000000c0)={r9, 0x1, '!'}, &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000140)=r9, 0x4) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:39 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:39 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x48800, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000240)) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:40 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x8, 0x12, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f0000000000)=0x9, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:40 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = gettid() tkill(r6, 0x1004000000013) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r9, 0x0, 0x7, &(0x7f00000001c0)='TIPCv2\x00', 0xffffffffffffffff}, 0x30) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f00000002c0)={0x1, [0x0]}) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000240)={0x0, 0xb203, &(0x7f0000000400)={&(0x7f0000000100)={0x6c, r4, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2, 0xdb}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r4, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x41840}, 0x4000000) lseek(r0, 0x0, 0x0) 13:42:40 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x4) 13:42:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf85c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:40 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x20002, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000701000/0x3000)=nil, 0x3000, 0x1000000, 0x12, r1, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:40 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x73, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) dup3(r1, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_ONE_REG(r5, 0x4010aeac, &(0x7f0000000000)={0x73, 0x401}) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000540)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:40 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x4) 13:42:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xf95c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:40 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') sendmsg$NL80211_CMD_GET_MPP(r8, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r9, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4080}, 0x1) r10 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r10, 0x8004551a, 0x0) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000180)={0x200, 0x8, 0x4, 0x1000, 0xfff, {r4, r5/1000+60000}, {0x3, 0xc, 0x1, 0x0, 0x3f, 0x9, "43ad0d0a"}, 0x8, 0x1, @userptr=0x7e, 0x6, 0x0, r10}) ioctl$ASHMEM_GET_PROT_MASK(r11, 0x7706, &(0x7f0000000040)) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:40 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_EXP_DELETE(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000040)={&(0x7f0000000840)={0x288, 0x2, 0x2, 0x301, 0x0, 0x0, {0xa, 0x0, 0x5}, [@CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x7f}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x8}, @CTA_EXPECT_TUPLE={0x98, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0={0xfc, 0x0, [], 0x1}}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x33}}}}]}, @CTA_EXPECT_NAT={0xe0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x1c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x60, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, [], 0x1}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @private=0xa010100}}}]}, @CTA_EXPECT_NAT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'netbios-ns\x00'}, @CTA_EXPECT_NAT={0xb4, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x4}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x4c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_NAT_TUPLE={0x44, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x28}}]}, @CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}]}, @CTA_EXPECT_MASK={0x18, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}]}, 0x288}, 0x1, 0x0, 0x0, 0x8000}, 0x80) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:40 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x4) 13:42:40 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x1000000, 0x12, r0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r2 = gettid() tkill(r2, 0x1004000000013) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=r2) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:40 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x3) 13:42:43 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RFLUSH(r3, &(0x7f0000000100)={0x7, 0x6d, 0x1}, 0x7) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x0, 0x26, 0x0, "f57bda297f0998e719bcf2a1bb55d8151a48adcc2ad5cc83b9852252cfb29f5b50c3b1b4fedaaf15585d9e39f0c6718a14e0b7b149900724fad37d18c1f096d183c42c72355117c00e1e4750d15e5fbc"}, 0xd8) 13:42:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_BEACON(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000001c00)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010026bd7000000800000e00000028000e00b9"], 0x3c}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r4, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x5}}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5, 0xe4, 0x1}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x1}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x91}, 0x10) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000140)={@private2, 0x5, 0x2, 0x2, 0x0, 0x8, 0x2}, &(0x7f00000001c0)=0x20) r11 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$TIOCSTI(r11, 0x5412, 0x4) ioctl$ASHMEM_SET_NAME(r5, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfa5c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:43 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)='/dev/ashmem\x00\x9eo\x9bq\xe6\xea\xdd\xd7e\r^\xb8A\rJrx\xe4.\x1c\x88\x01\xe7V\x98\xdeE\x80\x1b.y\x02\xde\x82\xa5]\xdb\xbd\xc6\x9beL$\xd7\xed_\xd4\x98i\xbf5}^\xf8\x9f,\xb7\vo{iL1:f\xffL:\x9c\x8a5\xb4\xe4\x16\xd4\xb1`p\xdf\b\xf3M\x81p\xf2b`j\xc0\x81\x80\xa8\xce\x91t,\x80N\xb3\x0eT,m/i\xea\xd9\xe5\xa1y\x138\\J\xd6\xfb\xe7/\xa8\ni\'\xe6\xae\xa7\xd5\x10\"\xe9\x97\x82R\xc62A\xaf\x04\xcf:\x95\f?\x00'/169, 0xa9, 0x1) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CHECK_EXTENSION_VM(r4, 0xae03, 0x1c31) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000)=0xda, 0x4) 13:42:43 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = gettid() tkill(r1, 0x1004000000013) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r5, 0xfffffffffffffde8, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r5, 0x0, 0x9, &(0x7f0000000080)='ip6_vti0\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r4, 0x0, 0x4, &(0x7f0000000000)='@:*\x00', r6}, 0x30) r8 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:43 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:43 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:43 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:43 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 13:42:43 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000703000/0x1000)=nil, 0x1000, 0x200001d, 0x4010, r0, 0xee988000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)=ANY=[@ANYBLOB="0200de000dadf94b85fb38d84e4e5f34d1f45ed013d17c08a6c759581c286405d73cb677fdd91b945073280e7e76fc606d9457ed4dd91bfc9c9deaedb1bb3d0549c75aff452403bfc2f2d20f11b276a12c964249f62e37f6f4240061ad6070fccbb5037756b7d6dda507fdaab960fbe8f75a82b0fde0715f5803fa687cd48a6efa29a1b071a18084543f080500919dfb5e9a3be1b26fc3207550fb99ed9992616cf93077f87041346f8fe007c7c7a596cfa25277a98e6e00f86887c3306d46b780b7839b0b48bbafca3c2669b8b63d76c8b866c4"]) 13:42:43 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x3000006, 0x11, r0, 0x93b7b000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x181000, 0x0) write$P9_ROPEN(r1, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x2, 0x2, 0x4}, 0x10000}}, 0x18) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f00000001c0)={0x7f}, 0x4) clock_settime(0x4, &(0x7f0000000180)={0x0, 0x3938700}) 13:42:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfb5c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:43 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) lseek(r0, 0x4, 0x2) 13:42:43 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x410780, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={r3, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @empty}}, [0x2, 0x240000, 0x1, 0x1000, 0x0, 0x2, 0x8, 0x7ff, 0xffffffffffffffe1, 0x4, 0x101, 0x4, 0x28, 0x7, 0xfffffffffffffe00]}, &(0x7f00000000c0)=0x100) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x78, 0x20041) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) lseek(r4, 0x4000000004, 0x3) 13:42:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x2000006, 0x100010, r3, 0x295b9000) ioctl$ASHMEM_SET_NAME(r3, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r3, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:43 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) lseek(r0, 0x4, 0x2) 13:42:46 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x22000, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x5) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:46 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/autofs\x00', 0x28280, 0x0) pwritev(r0, &(0x7f0000001240)=[{&(0x7f0000000bc0)="8fbf94e0162af99cf208eeea53c5302239693055429bec4a001fcdd5979872362a87f0d29d6e726ba5", 0x29}, {&(0x7f0000000c00)="9baac2b054983baf", 0x8}, {&(0x7f0000000c40)="2124787e038d77b8dbad4e0c17f0ca06363c44f8854181a2c789f3c02c155ad1448c1ef68fa38ece335907ea8ebefa853231132ee4419bb0a1ad8f3b5aecbb8c242fe3fdc0b7d01cbee45d891223c5e8b7f90df916e250e9e238c7c74a2fbdb0417fdf5b1715f0f9ced79a8059d61ea2ef7ce71cb5df5e91951a476853e4d3f7c5369555bee27f97b7", 0x89}, {&(0x7f0000000d00)="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", 0xfd}, {&(0x7f0000000e00)="886909d7266c914c187722033a10831bd164bb893b97d024245f63a00cf150891d719609ba29495e6f431bd15a45c900b6af1c6d49dcec881b727c40afe9d2c5188b9af0185e3af64d8a12bc23cdd77ccc8ecb462e45932fe7c3cc3e4e00926c064e9b11f0bdff0e77671e3d41e3c8e3cdd9b7f626fe31d038285097fa8709e26f1072fa4dfcdddd5183e7ccb4bf4ae502938e396a0b56bc00d2ca8347a15ae4b0119fdf9aa98f7dec51d927f78775cec676ea3032d43c032d0c48f01444cc93ea3e5c46ebc675cce107bf4eee6708a1186f3925f770518e84f079dddfb3cad678e91334cbc58902e7797cfc295a0f57cb4c5d831137072d2b", 0xf9}, {&(0x7f0000000f00)="d2faf6cdafbe2dc8d50eb610286f71fe8d1d7743e544f62e060a6a5203e893e1e8989a953f974d73834890e607754946d9d4b89bb8da", 0x36}, {&(0x7f0000000f40)="9a8560735f3de9a8f5c523d7d4510cea31f8a2687a03125af65226a9eb836027aeb3f9d8cc21c94061cb7deb491b4e212ef21cc79a105af55387537718c334ae04786bba287da9f2bedc408aa6ef0670270d36556979c733be0f2eefce6fb1a6d557622edace46cb49068ae4d034d4baa154e277f2795534607c4e6ad93c78ef14c702c6a818ff7d", 0x88}, {&(0x7f0000001000)="e76ad9e4cefbd2f63edaeabf1c2c1385868c41b1a78919c4f63c33adfe997d1561817641eed34d0a62dea75ba3e34cb17bba91b4d55f5f16aaed379942a2ddea55b17e11f23fcd7b03e5447a129347c6b78b0307299955140ec6093fcb7fe2d1f4e918ee019101e312051af79fa61fb9a23e26ce0400ee89c03b14b195058aaa26f75f3ae92523504f76d831f6e8e789ca6e794c951618cc63c45a914e44efda90b3c2a9cdb9facb70fbcf5cdac37d9de2a7d356e5f152177c2b3a1d4b46dda4c50e227e5df862e7aed6fad8eebcbf93efa71439e25caf28a8d2a928b0", 0xdd}, {&(0x7f0000001100)="b989bf880fe0cba4ec4097f114a2c6d218b016621a4ed13ba54330c856c6cd829d05eb2d36ef233e", 0x28}, {&(0x7f0000001140)="5ae3458d8db79f60ffe2ffcc0a1f8f72e447260e8295f8878fad85676a48de08e76d497e80a9efbbe04c45904ddd2c62eefdfdc8fdc31b992b5e64dc4c6783142e20b771a4613fe2b0e62f42fb874bd658bfdf26320413d1eecd9e65361cce15f7a6d420fb402d0e0f5e531f85d38ce3f9aa6a7c97a3b572f2948d02d6033d383d0ca45d55f7847a7071f0524eaa0dadab2bedb59748f8374e5a4c27413bd4c3e8afc688d51f86e1c9b3370bfdb303dcb7f47459bd342f1a569f76d8598cc57114f104e1967ee7e7aa18e358d647ecc0a2cdb4df976840b3fe6bdbff17a2ace4041e022d2e", 0xe5}], 0xa, 0x7fff) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f5, 0x400, 0x70bd2c, 0x25dfdbfb, "", ["", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0xc8d0}, 0x4) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000001c0)={0x80000008}) ioctl$ASHMEM_SET_NAME(r1, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2d8a6640da4ac0c6, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f0000000140)={0x5, 0x8, 0x762}) 13:42:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) lseek(r0, 0x4, 0x2) 13:42:46 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$HIDIOCGUCODE(r3, 0xc018480d, &(0x7f0000000040)={0x1, 0x2, 0x7, 0x5, 0x2, 0x1f}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7f) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000240)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3\b\x00\x00\x00\x00\x00\x00\x00f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x84|\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x1, @empty, 'sit0\x00'}}) 13:42:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfc5c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:46 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x404040, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x3, {{0xa, 0x4e23, 0x50, @private0={0xfc, 0x0, [], 0x1}, 0x1f}}, 0x0, 0x4, [{{0xa, 0x4e23, 0xff, @mcast1}}, {{0xa, 0x4e24, 0x7, @mcast2, 0x401}}, {{0xa, 0x4e20, 0x3, @loopback, 0xc35c}}, {{0xa, 0x4e20, 0xffff, @private1={0xfc, 0x1, [], 0x1}, 0x2}}]}, 0x290) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$alg(0x26, 0x5, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f00000005c0)={0xd0000002}) r6 = gettid() tkill(r6, 0x1004000000013) migrate_pages(r6, 0x9, &(0x7f0000000040)=0x7fffffff, &(0x7f0000000080)=0x80) lseek(r0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(0xffffffffffffffff, 0x1) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="010000004cc08acb5f7bc2f4bde8347711017f1f6d4a1c5c991ebccf5c8d02969f3762aaf4931e37d087da96423985b60000000d00000060199d936faa829f30fbce325713c57aff50c97c98dac5ee67f31ef2d53914f468e9701c28eb06da98111a670b43caf7818f7ebeadd50ff5b4229a456905d800fbfb9b9e32422b4e9ea53c076dd29d8109ff016466232113cf", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={r8, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000100)={r8, 0x3ff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000500)={r9, @in6={{0xa, 0x6, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7f}}}, &(0x7f00000001c0)=0x84) 13:42:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:46 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x42c000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:46 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x80) r4 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0x2) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x700000, 0x0) setsockopt$CAIFSO_REQ_PARAM(r8, 0x116, 0x80, &(0x7f0000000040)="03e448c7aa2c257e4344af933eff3de80a0e8d20ecf146a41ae94cbe6dbb813a6976ad3012e56f5cc604749af4a88d2f1b847c6445c126223f48525fe2bbb98adcadc24ff608ba39c634739be8f72ef9c3a5c19599a21d6981827e8adc432a509eb2983025e69a4a80c92609bce2f92ca7bc81daaa9662fd1db17589b8a2d860e404c2f037fc840996042691809a81ad43b2eee4cadcff120b3eef567055ba95858df9414bf340ee7e6e70deeb246168aff287072bb583a86990eab62777", 0xbe) r9 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x40400203) ioctl$KVM_DEASSIGN_DEV_IRQ(r9, 0x4040ae75, &(0x7f0000000140)={0x0, 0x6, 0x4, 0x105}) 13:42:46 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7ff) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:46 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x1ff, 0x385980) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x40000000400200) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r7, 0x111, 0x2, 0x0, 0x4) fsconfig$FSCONFIG_SET_FLAG(r4, 0x0, &(0x7f0000000040)='rw\x00', 0x0, 0x0) lseek(r0, 0x4, 0x0) 13:42:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfd5c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:46 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200642, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:46 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r7, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r7, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=r8, @ANYBLOB="01000000213734e0f0be03281207001f4fb47c693d26e8c1e58284c4e9d1fbf50c593e0fc6f25d3270c0c2140df9b3d38fdafcb28e0e7598c50c8925eaadb7062f2b2ea47ce970e1104a16060d00b7864153f0c894e3319b8874dd39d7e082e8447df9659e"], &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000000)={r8, 0x7, 0x7, 0x6, 0x2, 0x101, 0xf31f, 0x90e, {0x0, @in6={{0xa, 0x4e20, 0x6, @private0={0xfc, 0x0, [], 0x1}, 0x1d}}, 0x1ff, 0x0, 0xffff2211, 0x8, 0xe03c}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={r9, 0x8001}, 0x8) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:46 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x2, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) r3 = fcntl$dupfd(r2, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:49 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x19a3221a9c05b354, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 13:42:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x7, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) io_submit(r1, 0x3, &(0x7f0000000640)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x4, r2, &(0x7f0000000180)="86c7a3b9c3a0ea3617c692057315256389c12fb8662d7989559c623207ec468fa4ba12a25f76b33cb061ddfe56b09d4a0ffdb2d099c97301b12ddca05b", 0x3d, 0x8, 0x0, 0x2, r5}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0xff, r0, &(0x7f0000000240)="1482bbec977d1bf008e90c7767e6f11a4e41ede5cd449d5be0d0ef4c538f23249c36e692d8aeed1a66f48638495c60ee6fe45d8749ae33209e7a95981b53fde038045c9a24080ea9d0d740184a8085e8bf4de8d39ca78b5ca98c9bf37e6f6015c18a2b90677de1b4849b4ab35bd0ceee58447ed3ebe5efe44853bacd78289aaeb7b2e426512034db4fff9d83618a76e6556f5ee10d4e8179a7fc2c6e54edf53c6dc44c1704b06a288853e9c9c63cc175667acbf40a", 0xb5, 0x4464d49d, 0x0, 0x3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x5, r0, &(0x7f0000000540)="8b2396f0fadb7c9f4964fbfbcac1037d03e3718b47273f7cf762c9a93336f02602acfc2b26b103c886b5f1df81a0f572a59812297bc954f76e979cc2958d787f4185524486560b03687717b6c58caeb704365d139a8ebbf443dffe5a0f625a01a0124132c7040984895eac470a764af68575b99640eee28e7056b9f98da920f818c9794f67782c8ddd685f9a5468fb639277e557717d78467c211a99a0710e1e24d63271395451f5e885a314ff676c4338f50fb25d494b07a148ddf5b883b6f0fd30cf376f42bbcbea9f5899", 0xcc, 0x50, 0x0, 0x2, r8}]) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfe5c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:49 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:49 executing program 3: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sync_file_range(r5, 0x5, 0x1, 0x5) r6 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x109200, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r7) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000000)={0x0, @bt={0x3f, 0xdf6d, 0x1, 0x2, 0x7fffffff, 0x8, 0x0, 0x6b, 0xa2, 0x4, 0x50000000, 0x1ff, 0x1, 0xfff, 0x4, 0xa, {0x7, 0x7fffffff}, 0x3, 0x1f}}) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:49 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:49 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x7f1083, 0x0) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f0000000080)=""/157) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0x8004551a, 0x0) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) lseek(r0, 0x4, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r6, 0x8004551a, 0x0) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f0000000000)={{r6}, 0x4, 0x4, 0x3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400201) ioctl$PIO_UNIMAPCLR(r9, 0x4b68, &(0x7f0000000140)={0xff80, 0x4, 0x3}) 13:42:49 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000240), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x12, r3, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f00000007c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x648, 0x248, 0xc0, 0x2e8, 0x248, 0x0, 0x5b0, 0x5b0, 0x5b0, 0x5b0, 0x5b0, 0x6, &(0x7f0000000340), {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0xe}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x1, 0x8}}}, {{@ip={@private=0x3, @multicast1, 0xffffffff, 0x0, 'bond_slave_1\x00', 'veth1\x00', {0xff}, {0xff}, 0x67, 0x1, 0x9}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@ip={@local, @private=0xa010100, 0xffffff00, 0xff, 'veth1_to_bond\x00', 'veth1_to_batadv\x00', {0xff}, {}, 0x21, 0x1, 0x3e}, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x40, 0xd4, 0x0, 0x1}}, @common=@inet=@tcpmss={{0x28, 'tcpmss\x00'}, {0x1000, 0x2}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x80000000, 0x1, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e22}}}, {{@ip={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff, 0xff000000, 'ip6_vti0\x00', 'veth0_to_batadv\x00', {0xff}, {0xff}, 0x11, 0x2, 0x4c}, 0x0, 0x2a0, 0x2c8, 0x0, {}, [@common=@unspec=@bpf0={{0x230, 'bpf\x00'}, {0x2d, [{0x4, 0x6, 0x5}, {0x3, 0x9, 0x6, 0x7}, {0x0, 0x81, 0xff, 0x800}, {0x4024, 0xbe, 0x0, 0x5}, {0x3f, 0x5, 0x4f, 0x401}, {0x1, 0x3f, 0x81, 0xfffffffc}, {0x3, 0x3, 0x9, 0x3}, {0xe03, 0x81, 0x1, 0x5565}, {0x3f, 0x1f, 0x20, 0x8}, {0x7fff, 0x2, 0xff, 0xfffffff9}, {0x26, 0x4, 0x20, 0x5}, {0x9, 0x80, 0x9, 0x8}, {0x5, 0x80, 0x2, 0x80}, {0x9, 0x7, 0x6, 0x8001}, {0x9, 0x20, 0xe9, 0x401}, {0x100, 0xff, 0x20, 0x7}, {0x90, 0x80, 0x5, 0x8}, {0x0, 0x7, 0x7f, 0x8}, {0x8, 0xe0, 0x1f, 0x6}, {0x7, 0xa3, 0x40, 0xbe}, {0x9, 0x7f, 0x81, 0x4}, {0x1, 0x7f, 0x6, 0x200}, {0x2e60, 0x93, 0x1f, 0x6}, {0x8000, 0x7, 0x40}, {0x100, 0x4, 0x1, 0x401}, {0x5, 0x20, 0x9f, 0x7}, {0x0, 0x0, 0x1f, 0x2b9a48b4}, {0xff, 0x7, 0xff, 0x7f}, {0xa1, 0x0, 0x9, 0x7fffffff}, {0x3, 0x7, 0x8, 0xffff}, {0x4, 0x3, 0x20, 0x100}, {0xc3c8, 0x40, 0x80, 0x4}, {0x7fff, 0x1, 0x81, 0x10001}, {0xbf77, 0x6d, 0x5, 0x1}, {0x5, 0x81, 0x6, 0x7fffffff}, {0x6e, 0x5, 0x0, 0x2}, {0x9b2, 0x6, 0x56, 0x3}, {0x4b, 0x3f, 0x1, 0x7f}, {0x0, 0x8, 0x5, 0x6}, {0xcf, 0x50, 0x34, 0x200}, {0x1, 0x1, 0x1, 0x4}, {0x5, 0x5, 0x80, 0x35d2c43}, {0x2, 0x0, 0xfa, 0x4}, {0x8, 0x4, 0x2, 0x3}, {0x1, 0x82, 0x81, 0x7fff}, {0x81, 0x13, 0xd6, 0x7}, {0x0, 0x2, 0x4, 0x200}, {0x1, 0x0, 0x1, 0x1}, {0x4, 0x5, 0x8}, {0x1ff, 0x9, 0x1, 0x20}, {0x3, 0x40, 0x40, 0x3}, {0x3a7, 0xd0, 0xb7, 0x9}, {0x7, 0x3f, 0xce, 0x1000}, {0x91d, 0xa6, 0x1f, 0x6}, {0x7, 0xfb, 0x3c, 0x5}, {0x8, 0x0, 0x6, 0x400}, {0xffff, 0x7, 0xff, 0x800}, {0x4d, 0x4, 0x0, 0x3}, {0x100, 0xde, 0x3f, 0x9}, {0x6, 0x9, 0x10, 0xfffffff7}, {0x1, 0xa2, 0x7f, 0x2}, {0x0, 0x20, 0x2, 0x6}, {0x2, 0x8, 0x5, 0x1}, {0x8, 0x8, 0x3f, 0x7}], {0x80000001}}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x20, 0x81, 0x3}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x6a8) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$inet(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)="d37b067321cf2b3bc50f12815b6436fb378231b13da91a774c46dda712a2adad588b5e0e6ac14a93a07059036cb85bbe21070635f70833b31329db106af8e1aa59a64585732819c378e4d168a76a5fee4c9d348cd7223c63af9910b60825566d27952dcd007614504fa4caf28c5bc44579461aaaf1274a394e4caf9096c1de7902f6a1010a76c352", 0x88}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="110000000000000000000000010000000400000000000000110000000000000000000000010000004000000000000000340000000000000000000000070000004424b611ac1e0001000000030a010101800000017f00000100000001e000000280000000000000001400000000000000000000000200000004000000000000001400000000000000000000000100000001000000000000001c000000000000000000000008000000", @ANYRES32=r8, @ANYBLOB="0a0101017f1300010004000014000003000000000000000070f7128627ef38010000000400000000000000110000000000000000000000010000000900000000000000573854a057879869f4b2aea7c8f33ff434110f075dba3fd6a1dc193835d00f0fad02b11533657faaa5f78420f0f11eb613913bac19acb01fcf765503b80c866ac0505213761fb4360409da4d6965ccb73795f872a09473e123b8a8c37d090dff8407e5c09d2492765dfb6a7fe168fb1d3edb63e0008723c87ca182c3dafeae333abe2ce14f642848f804322459e3cf73e21a8d42ee439fef3c"], 0xe8}, 0x28000010) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) ftruncate(r3, 0x2) 13:42:49 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:49 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f0000000000)={0x2a3, 0x1, 0x4, 0xe000, 0xfffff460, {}, {0x2, 0x1, 0x8, 0x0, 0xe, 0xa8, "23b40db4"}, 0x3ff, 0x1, @fd, 0x3ff, 0x0, 0xffffffffffffffff}) ioctl$FBIOGET_CON2FBMAP(r4, 0x460f, &(0x7f0000000080)={0x2e}) ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:49 executing program 0: prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x1f) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f0000000000)={0x7, 0x7, 0x1}, &(0x7f0000000040)=0x28) prctl$PR_CAPBSET_DROP(0x18, 0x1f) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xff5c0200, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:49 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x2010, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r7, 0x8004551a, 0x0) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000000)={0x6, 0xb, 0x4, 0x0, 0x28b3ce8c, {0x0, 0xea60}, {0x4, 0x1, 0x0, 0x6, 0xff, 0xff, "ee383614"}, 0x1, 0x2, @fd=r6, 0x9, 0x0, r7}) 13:42:49 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:49 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_int(r3, &(0x7f0000000000)=0x4, 0x12) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x10040, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x200000) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f0000000180)={0x80000000, &(0x7f0000000040)=[r4, r5]}, 0x2) 13:42:50 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x40, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = accept$packet(r5, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) r7 = fcntl$dupfd(r6, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$AUDIT_SIGNAL_INFO(r7, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x3f2, 0x300, 0x70bd2b, 0x25dfdbfd}, 0x10}, 0x1, 0x0, 0x0, 0x20008800}, 0x91) 13:42:50 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x4000)=nil, 0x4000, 0x0, 0x10010, r0, 0xfffff000) socketpair$unix(0x1, 0xc7c3508b0d51ed49, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000000)=0x5, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000540)=[@in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e21, 0x3, @private0, 0x5}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, @in6={0xa, 0x4e20, 0x0, @private2={0xfc, 0x2, [], 0x1}, 0x9}, @in6={0xa, 0x4e20, 0x9, @private2, 0x4}, @in6={0xa, 0x4e21, 0x0, @loopback, 0x6}], 0xac) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') 13:42:50 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(0x0, r5, 0x0) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchown(r6, 0x0, r8) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000000)={0xa0, 0x0, 0x7, {{0x4, 0x3, 0x7, 0xfffffffffffffe00, 0x40, 0x4, {0x4, 0x6958, 0x8e4, 0x1f, 0x100000000, 0x2, 0x8, 0x80, 0x9, 0x3, 0xbd18, r5, r8, 0x0, 0x5}}, {0x0, 0x19}}}, 0xa0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xff7f0000, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:50 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getpid() r2 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) renameat2(r2, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r1, 0xc0104811, &(0x7f0000000040)={0x1ff, 0x7, 0x7, 0x5}) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r5, 0x80047456, &(0x7f0000000000)) 13:42:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f0000000400)={'filter\x00', 0x4}, 0x68) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SETDUPLEX(r6, 0x5016, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000240)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5\xd7\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12\x01\x00\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r7 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x200000, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, &(0x7f0000000040)={{0x2, 0x0, @descriptor="a803e94c7d3e84ea"}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TCSBRK(r10, 0x5409, 0xfffffffffffffc00) 13:42:50 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:50 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xffffa888, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:50 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:50 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = gettid() tkill(r1, 0x1004000000013) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000340)={0x1822, 0x1, {r1}, {}, 0x5, 0x22}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)=0x0) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x38, 0x3e9, 0x400, 0x70bd2c, 0x25dfdbfe, {0x14, 0x1, 0x0, r2, 0x4000, 0x3, 0x7, 0x2, 0x0, 0x6}, ["", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x20004080) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$SG_GET_ACCESS_COUNT(r11, 0x2289, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$NFQNL_MSG_CONFIG(r8, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="640000000203010100000000000000000a00000708000440000000040900020000000b1a020000000800010003000005090002000000000401000000090002000000faff010000000800044000000002080004400000002209000200fffffd5d0100000063d7e09dffa5206bc35a6ed8b29e2e2efc7ba253442aafc7d7eca022b41c68d5657c0ef4e78e390679bbe1a0fb26043973bba027132124ec91672c49843cc3f89c1ebc3ec8fe541cbc9273b90ba373b6e6df173721f06346ba3d7ff084914c403c632fa1fe47401f5cbf2d35379d74cfa960d29d5979916d2a848594ba313a41ae9459210e2e42005683e202ca1f9280d3b9aa0546f949a17a3d33cd815b65cd6669045c"], 0x64}, 0x1, 0x0, 0x0, 0x40040}, 0x4000004) lseek(r0, 0x4, 0x0) 13:42:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000180)) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x2000000, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000240)="61e868ac4ddbc3a972a3fa89067354c18da9ff462c22ce45c864c7858168032a9ce7c2439c641dff1674f406a74504cb02cce7477b42935ecd9cf290f90998e67f851186b5c055fb650049f82dea54f067fcb18fc6c8b30e8375198f953c56886c189aa9db0d28aac73abb33f73eb7f5794224564acfc1a84a5f523a3ada879dcbb5a3fca9179efca87a1e5f16c48eab1cd67fd778c3a26a5027dc92e669ffd445", 0xa1}, {&(0x7f0000000540)="236c89cfb26dc49e18b74d0ad6f377435f912cf3d00876150a420ce32b06683017d758e9f6def8462b43f326954e447bb7e074b7e433d0fa95debfc222770ad2dcc3a033dbd9379e3c99fe34afc9e31d95c556670a7c68263eeb915ebe78c696f616e0262221bc156eb9931ecce008a9d39869ef227f464dc8f8d9595cc6f8b986c0c4ff8e7dc270726ac6e4e2c3178f547454bdfa97893eed8e4384c1ae6f3cd12af582e40439cdb1c7abefa519495dfc2c47db6be45c5a5b9b79f2446a57cd0ed5b9826a917dcace24694c9f8a8ec54e741e9a903b40b4bfe9c868fa7ddfd7e5684afd7c83c8b1", 0xe8}], 0x2, 0xea03) 13:42:50 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:50 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x40100, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000000)=':#-[\x00') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000000)={0xf4, 0x200, 0x8}) 13:42:51 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:51 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffff000, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:51 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:51 executing program 5: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x4, 0x2) 13:42:51 executing program 5: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x4, 0x2) 13:42:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xffffff7f, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) [ 2410.575381][T13986] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 2411.126689][T13986] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 2411.142682][T13986] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2411.181017][T13986] usb 1-1: Product: syz [ 2411.199920][T13986] usb 1-1: Manufacturer: syz [ 2411.226178][T13986] usb 1-1: SerialNumber: syz 13:42:53 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x200000000002, 0x0) 13:42:53 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) tkill(0x0, 0x1004000000013) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone3(&(0x7f0000002900)={0xc00, &(0x7f0000000340), &(0x7f0000000840)=0x0, &(0x7f0000000880), {0x21}, &(0x7f00000008c0)=""/4096, 0x1000, &(0x7f00000018c0)=""/4096, &(0x7f00000028c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, {r3}}, 0x58) ioprio_set$pid(0x2, r4, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = dup(0xffffffffffffffff) getpeername$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) r9 = openat$cgroup_ro(r8, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r10 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r9, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="e8000000", @ANYRES16=r10, @ANYBLOB="010026bd7000fedbdf250d00000034000380080003000000000006000400050000000500080008000000060007004e210000060007004e22000008ee0500ac1e00012c0003800800010000000000080003000400000005000800400000000800030000000000050008000000000024000180060002005e00000008000b00736970000800050000000000060002006c0000000c0003800800010002000000080005002000000008020400ffffff7f080005003f0000001c000280080003000100000006000f000000000008000500ffffffff08000600040000000800050000020000"], 0xe8}, 0x1, 0x0, 0x0, 0x4004080}, 0x190) sendmsg$IPVS_CMD_NEW_DAEMON(r7, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4048180}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="030825bd7000fedbdf250900000008000400050000003c0001800600020033000000060004004e2100000800050003000000080009001a000000060002003b0000000800080000000000060004004e21000096d8aa2493458429573d73916eac02175c32fd968dc6c09066832213b64ede72d44ece1e687e883ceb2878a361a092de45fdc779fce3660dbbe2b447d03e351c007476106c46d73981e44f22856a2600aca2830833a277b60128f23c6af5c84cbb75ebac653e11320270abcfc8cd8feaceffc9c9b3160910ab36acecf11b484244450f7936d270e1"], 0x58}, 0x1, 0x0, 0x0, 0x4040000}, 0x8010) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTKt\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\xba\x86\xae\x9c\x9f\x93\xff]\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x12\xfb\x14\x91Q6\x95q\xd0\xfa\xb2e9\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xa1}\xb20\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90Bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\x0f@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:53 executing program 5: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x4, 0x2) 13:42:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:53 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:54 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:54 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5400bcfe", @ANYRES16=r2, @ANYBLOB="000129bd7000fedbdf250400000005000600090000000400040008000200040000000800020003000000050005000500000008000200060000001400010000000000000000000000ffffac1e0101"], 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0xf32469acc52bef68, 0x10, r0, 0xdf7ae000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:54 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getpid() r2 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) renameat2(r2, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r1, 0xc0104811, &(0x7f0000000040)={0x1ff, 0x7, 0x7, 0x5}) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r5, 0x80047456, &(0x7f0000000000)) 13:42:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xffffffe4, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:54 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:54 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r5, 0x5501) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) [ 2413.268462][T22353] usb 1-1: USB disconnect, device number 11 13:42:54 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:54 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getpid() r2 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) renameat2(r2, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r1, 0xc0104811, &(0x7f0000000040)={0x1ff, 0x7, 0x7, 0x5}) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r5, 0x80047456, &(0x7f0000000000)) 13:42:54 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:54 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffff0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:54 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x692600, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:55 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:55 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$LOOP_SET_DIRECT_IO(r6, 0x4c08, 0x7fff) 13:42:55 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getpid() r2 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) renameat2(r2, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r1, 0xc0104811, &(0x7f0000000040)={0x1ff, 0x7, 0x7, 0x5}) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r5, 0x80047456, &(0x7f0000000000)) 13:42:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:55 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:55 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) gettid() r5 = accept4$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x1c, 0x800) lseek(r5, 0x9fe, 0x0) 13:42:55 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:55 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getpid() r2 = open(&(0x7f0000000280)='.\x00', 0x2000, 0x40) renameat2(r2, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r1, 0xc0104811, &(0x7f0000000040)={0x1ff, 0x7, 0x7, 0x5}) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000540)='\x00\x00\xc9\xdf\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\x11e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcbTK\\\x9f\x9c\x9e\xf5{\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xff\x8e\xf6m\x04\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-;\xf1\xf3\x01jLzW\x1c``T\x84cO\x04\x97Y\x85\xac\xc8\xa3\x12\x9c\xb8>\xb1>\xf0\xee\x97\xbb\xae\x19\xc3Lf\x98\xd0\xc1\xf0\x88\xf4\x881\xd5y\xa4\x02o\x03\x83^\xdaJ\t,\xd9\xe4\b\xce\xd0%\x85\xd2e\x19/JP8\xb7\r\xca\xcd`X\x99\xf77\x86\xafG\x9b\x1a\xfc\xb8\xd8\xce\xbf\xb0u\xd2LOXq\x1d\xcfkI\x151\xca\xb8\x9c/\x02\xbbv\xa8\xac\xf7T\xed$j\x86W\xe2-\xdb\r\xf47\xa4{3(%\x17\xba\xae\xca\x1cO\xa9.\t\xedZ\xaaD\xa4\xf4\x91\x85\xab,\x8e\xac\xfb\xba\xf2C\x91\xd3\xfc\xf4\xa0\x9cNY\x1e\xd8\x8ae\xf4Ld,\xe0\x1e\x14x\xa3i\xb2\x93?\xda\x8f\x0f\xeb>=z\xbbs\x9b\xe6}Vj\xee5q\xad\x9a\xf57\xd2\xce\x00\x80\x00\x006\xd0\xd77\xd4\x15\r\xc5\x9e\xdd\xa5\x83vS\vR\xc4\x14\x15\xc1\x9a\xfd9\xa0\x0eu\x95G\x86v\xa2\x04\x19\xfeS\x85\xc5\xd3M\x85\x1a\xea\x9f\xf7\x9c\xf5\x9a\x8e\x03\xbdfD\x84,a\x00\x00\x00l>1\xca\xe4\x9a\xec\xec\xb5\x94\x1f>P\xa7tL\xe8\xa6\xdc\xc3#\x8e\x84]\xc0N&\x15\x14\xc9r\xe9\x98DA O\xa1\x95\xd5\x8d\x8f\xd4\xc6\xba\xdc\x10\x95\xf2\xe8\xa3\x8a\x91\xfd\n\x82\'\x18\xc4=\x82\x05\xad\x00\xeb\x90bu\x93\xac\xfd\xcf]\xd0i\x8fI\xd1\x1c\xb962p\xfd\xa7\x97\xe2;\xcb\xf5y\xd3\xd6g^\x8a\xa3\xf8A\xec\xc1\xdb\x8f\xab\x10\xac\x88\xa0\xca\xa6\x1c\xd4^\xacI\xb3\xbc\x0f\x12{\xc9\xb13/9\x91#\x95~\x93gV\xfc\x7f4$\x9d\xd7\x89\x11O\xf0(\xbb\v@u\xa1\xe2\xf9\x89\xa8A\x88\xc2\xe1\x89\xc0\xf4\xfe{\v\x8c\xe5\x01\xc8_\x984\x04G\xfa\xb1\xf0E9i\x19\xe2\xbae\xcf\xf7\xa7\x1a\xfa\xe3~\xae\xcd\xebZb\xb4\x81=#\'\xd4\xfe\xa4\x15\x02\x10\xe6R\x86\x19\xfa\x8f\xef\x91E\xd8\x9d\xd5\xe6\xcaQM\x86k3\xb6n\xcdV\xba\x9d\n\xfc\xdd\xb1\xc3V\f\x8d3\xc2\x15\xa3\x05g\xaf\xa56\xa2\x9f\xb1\xb9I\x97@D\f\xd8\x90\xd0p\x89&|I\x97\x87\v\xb5\x18\x9f\xc7D+\x03<\x8d\x01\xca\x06\xea\xfde\\\x82\xca\xdf}\xde\xbc\x01\x16\x1a\xdb\xad\xae') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r5, 0x80047456, &(0x7f0000000000)) 13:42:55 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0xf, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:55 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:55 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x40, 0x0) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="2900000006000000000000000000000006000000000080000000000000000000000000000000000000c0f76055f2641655a22031a561aeb62d26aaf35687839541518a8c08a96922156cdede89807b4c21f81cf4618da64f"], 0x29) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x5}, 0x1c) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) lseek(r0, 0x4, 0x0) getsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000040)=0x3f, &(0x7f0000000080)) 13:42:55 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x10, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:55 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:56 executing program 3 (fault-call:4 fault-nth:0): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x25, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:56 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:56 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000000040)={0x9, 0x1}) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) r6 = dup(r0) r7 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r7, 0x8004551a, 0x0) socket$pppoe(0x18, 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000000)=[r5, r6, r7, r0, r7], 0x5) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x100010, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) [ 2415.177486][T32033] FAULT_INJECTION: forcing a failure. [ 2415.177486][T32033] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.182997][T32035] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2415.240937][T32033] CPU: 1 PID: 32033 Comm: syz-executor.3 Not tainted 5.7.0-syzkaller #0 [ 2415.249310][T32033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2415.259375][T32033] Call Trace: [ 2415.262695][T32033] dump_stack+0x188/0x20d [ 2415.267047][T32033] should_fail.cold+0x5/0xa [ 2415.271566][T32033] ? fault_create_debugfs_attr+0x140/0x140 [ 2415.277484][T32033] should_failslab+0x5/0xf [ 2415.281913][T32033] __kmalloc+0x2d9/0x7a0 [ 2415.286170][T32033] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2415.292170][T32033] ? tomoyo_realpath_from_path+0xc2/0x620 [ 2415.297906][T32033] ? lock_release+0x800/0x800 [ 2415.302688][T32033] ? __lock_acquire+0xc6c/0x48a0 [ 2415.307645][T32033] tomoyo_realpath_from_path+0xc2/0x620 [ 2415.313224][T32033] ? tomoyo_profile+0x42/0x50 [ 2415.317921][T32033] tomoyo_path_number_perm+0x1c2/0x4d0 [ 2415.323397][T32033] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 2415.329046][T32033] ? tomoyo_execute_permission+0x470/0x470 [ 2415.334898][T32033] ? __fget_files+0x30d/0x500 [ 2415.339630][T32033] ? __fget_files+0x32f/0x500 [ 2415.341343][T32042] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2415.344329][T32033] ? ksys_dup3+0x3c0/0x3c0 [ 2415.344346][T32033] ? __sb_end_write+0x101/0x1d0 [ 2415.344360][T32033] ? vfs_write+0x161/0x5d0 [ 2415.344383][T32033] security_file_ioctl+0x6c/0xb0 [ 2415.344406][T32033] ksys_ioctl+0x50/0x180 [ 2415.376394][T32033] __x64_sys_ioctl+0x6f/0xb0 [ 2415.381005][T32033] do_syscall_64+0xf6/0x7d0 [ 2415.385526][T32033] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2415.391426][T32033] RIP: 0033:0x45ca69 [ 2415.395324][T32033] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2415.415232][T32033] RSP: 002b:00007f228fa41c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2415.423657][T32033] RAX: ffffffffffffffda RBX: 00000000004e1140 RCX: 000000000045ca69 [ 2415.431642][T32033] RDX: 0000000020000380 RSI: 0000000040087708 RDI: 0000000000000003 [ 2415.439621][T32033] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2415.447602][T32033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2415.455583][T32033] R13: 000000000000020b R14: 00000000004c4535 R15: 00007f228fa426d4 13:42:56 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0xc0, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:56 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400002, 0x0) ioctl$DRM_IOCTL_GET_MAP(r4, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffb000/0x3000)=nil, 0x10001, 0x1, 0x44, &(0x7f0000ffc000/0x3000)=nil, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:42:56 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0xec0, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:56 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = gettid() tkill(r7, 0x1004000000013) mq_notify(r6, &(0x7f0000000000)={0x0, 0x6, 0x2, @tid=r7}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r8 = dup(0xffffffffffffffff) getpeername$packet(r8, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) r9 = openat$cgroup_ro(r8, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r10 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r9, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xe8, r10, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x40}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x5e}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x6c}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4004080}, 0x80) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r10, 0x4, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfc}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0xd}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x89}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0x10}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000004}, 0x800) 13:42:56 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x33fe0, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) [ 2416.224836][T32033] ERROR: Out of memory at tomoyo_realpath_from_path. 13:42:57 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:57 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x20000084, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:57 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x7ffff000, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:57 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:57 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x2, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x2, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:57 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:59 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r3, 0x8004551a, 0x0) r4 = fcntl$dupfd(r2, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0xff]}, 0x0, 0x8) 13:42:59 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x10, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:42:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x3, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:42:59 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:59 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0xec, 0x8, "2de177aae24fe9bd10d163c1460d3fd391e4fe07f7018d562fd64548a3aca8aace6f85c8e9380f867cc68940dbfd225d8433e2072402816f1b7c3ae16b03b7ed0bdbf7868d1dd616681c12cfb3ca168ef9471198e9cf26c4e35be4c3306ffa11e2473a9f5c392ca781b021d36699966147e3cda143527fa15811aac5a02a859b13ca0b194d6345936e9e7087f70d1b4392c058ae7e8dde93888dee627873d96cd0178b2c45970bc3a55760a8be9153023a7cdb81762bd747da4b23bd31364c35855c4b8fb2d5a557780b3d7adecc47d1a88c22ecd0bc1dca953c4338e9cc2229d11c592c"}, 0x804301) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x57}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000140)={r5, 0x0, 0x2}) 13:42:59 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:42:59 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_int(r3, 0x6, 0x4, &(0x7f0000000080), 0x4) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x2c}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc555d4fc7c7551ee}, 0xc0) 13:43:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x4, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:00 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x4c01, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:00 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:43:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_FLUSH(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000000406010200000000000000000000000673797a3200000000050001000700000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x20000080) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x1000001, 0x13, r3, 0x4000) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0xc00) ioctl$SG_GET_KEEP_ORPHAN(r4, 0x2288, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000004780)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r8, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(r9, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r10, @ANYBLOB="050200000000000000000500000008000300", @ANYRES32=r11, @ANYBLOB="1c4a0dd81ec1a8a5f77a47d769e358120bd4f6443598f1e8b2fd8604fee7ce0341c6bac1c2b4c4ab3727"], 0x1c}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000340)={@loopback, @local, 0x0}, &(0x7f0000000380)=0xc) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="200026bd7000ffdbdf251300000008000300", @ANYRES32=r12, @ANYBLOB="050030000000000008000300", @ANYRES32=0x0, @ANYBLOB="08000b000300000008003c000000000008002b0006000000060028000300000005002900010000000800310007000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20040001}, 0x1) lseek(r3, 0x4, 0x0) 13:43:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$isdn(r2, &(0x7f0000000340)={0x22, 0x1e, 0x8, 0x81, 0x9}, 0x6) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r5) r6 = accept4(r5, &(0x7f0000000000)=@sco={0x1f, @none}, &(0x7f0000000180)=0x80, 0x80800) r7 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r6, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20028410}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r7, 0x2, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x8000) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r3, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:00 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) bind$alg(r9, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r12 = socket(0x10, 0x3, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003d00)=[{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000a40)="cde6fbefd2da7cb758b00096e005266d132a816211ba56c2447009cd334962bffac71126854c6f55ca09e33ec5a71fa5e5979fb13c104751308c60b4a38c8592d50585349c1218cf3997c5ab1c79dfd9fdcbff22177965aa91b39e7d622c6de56f44a717acb7d774df95744b2a1ba0aae4f8dd2c036404d3fcea427b8e7064293814624f8d1796a721726fac6d896780df914277527e", 0x96}, {&(0x7f0000000b00)="02926405dfc765b799fb0fbc862551277af13b6a5e673852ea455103cf438528bee9919823f2361709022504dfd1195cf8aea4d81f24d3442e66dfe89eb5a2c2904e9f91819eef9aafcd97353e7af2deb80b432f65cceb4e0c7492addab37abd9d7bb8851245c9318809b22a93c1720818a3d59d42e9fb804bc76bcd66bc46b395a20080788ff111ef0d4c8121aee0a5fba97eafe0a37952849c36d14dfb6b532b796d3b5b74cc131c1e0a269c24d153592fb6c32ad9826ae23254ad03e5bec3c420e14687fc43725e7cdfdc969357674137d2", 0xd3}], 0x2, &(0x7f0000000c00)=[@iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @iv={0xb0, 0x117, 0x2, 0x97, "b1c9d1704acd98dc3599396f9fc064634e40fd9e90abab0d6d5a3a6f3596c01f8e6989c7f585196fa5abb02c0a4623ab87cdd2d87681a93bb77be39dac784dd7194e58e8d241381c88b11f9bb55900ec6a2f2ba2660607e36f8a94691843460e983c9d90a61bbce5901dcc5250577b38c7e46a424f0be5e1b5af541b8ea4c583deca6d8304045aa13247c423efd57bcef17c9c20cc3ea6"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x1110, 0xc810}, {0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001d40)="d8b0223484fe8942c7956fdbc00ca05f10612e3f7e1d9c49652326974335d50d74aac2afd3eef772405c47e7dc983389d864b0c22d47dbca76d72b733a7617020a69c51a2574700fac864b5f9763f5a77e08b58ee47d70e38234ad8df38ac4ae9fac5678589b7969c15c0cc11009412de1111b70e044b95a34bbf80eb16777fa78743301b5954dd873c6c24c84258caa78c4ed7cd695183f506ebbe6f974", 0x9e}, {&(0x7f0000001e00)="7f4562e7adbd6f509a7610abb4f80064c17f38f6d4e05af3f7c8a8c87a582f9898f232a958c20c9961acf4fca1f907b661f80ee6b7784bf76d6f5e824a893a7cd8701f43b10b674b3f841547f980c14f4e909214d010ddbd4b7b36629da1ce0a8bd3317d30dbfd489560902ea5f3b6c2fa77d6daf406707d80e891", 0x7b}, {&(0x7f0000001e80)="d3c28f7ca1559b0a7e", 0x9}, {&(0x7f0000001ec0)="1764a5939e61c00759c5212aa0df7ee9ae6d65ef650b9384309c5596a1a841f1d68f59b1e35ad1211d3b4a747f4edd50eb606a2281673be7a434f463ab3a08", 0x3f}], 0x4, &(0x7f0000001f40)=[@iv={0x38, 0x117, 0x2, 0x20, "697b6563cfba27723f0d4ece6d17032002a4f469084b977298c472b6c78cae2f"}], 0x38, 0x1}, {0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000001f80)="6c035abe75c97847842ea066898a1e06981b93ad2c653be3a9b128aa5c00fb45837d05ee6736fb819ec6605da8507810374e732b853adfbc9eba772a9a821b0ae7ac778496b42eafd027340f601e39a58ce7336924f0d5d85d8972dcaecd52476785d18eeada92949f2b506ea083d80861c77f69f31f61060cf9619a1d4d537a4245defa0e4466bffbb4a561897481db8ac41c", 0x93}, {&(0x7f0000002040)="970b4a92d1372b4a4c04d22a8f6164410ef4b9257261f05f271a9dbc1614d24cf06e562df4781c9464b02adcf0f889937c05a61cc48c3b14beb911f701ca33e2957b65c1d03dc9ce61a05c84c429f6cb2b2b3951c72c67ce87f42b67a1a1dc84b26622b0e4160d49c438ad2cde8fb99964d4e3ce58be34187af72ad0f9013d7e7f072c019f83e9bd37abfa22e0414dd8bbb43c452b916bb80cbc558dbe33d079516b62e380ba92634887c29ec66da3f96de1713308509d6144678f0c3922fc5ba1ab85", 0xc3}, {&(0x7f0000002140)="60ceda1f9f00a4fae4a43638bf0a47e22c484462f21c7dd2f3ab59ca8b730baa61984c81d0db1faf028c1194b064bb6e347ef94876e33ee5b0703d75a6b22df158f7e4e05dd44d570c0534b74efb9d39836ace624bccaa51b0b3d2a0088a35501f3cdb5d7d3a5de51f5e2022eb8609f1c0b2f5f4", 0x74}, {&(0x7f00000021c0)="a6ba840b53e09a223509bcfd508fdd01d58cc35e37d101cc4f4b270d78050118628bb6d284f15a7b670ce6b83662905606ad6f09e302774785bf4e3b9bc806dec2e98bbb82102e43d80d1268665795f37a697965243b21654abef2d7869a16a400aac83e1f83f76c9ed17907da2a6d91de36756ebb74ad7af25256d6fe4e4f4df60d5eb8c8ca21bc9a8035f4b16be9cbaeec75a325da25cdc9ff7fd4723a32aed15f2088e0eae7b5a4e3278ec7dff80be508ef2df891ebd1b3fad9a983d04306a4e9e248af4f278f56f04f89e1f5ee", 0xcf}, {&(0x7f00000022c0)="df1f0d9cdac28d10919d70c8913e7248e2de9140c1d84b06d6b236e71d5b952b424772cc59f8d6d4f7453c24fda4510481652c1b4d21273f132c3739bdcadeeb2144060886fcabaa8b978714ab6d2e9924cea9c9a238f899982ce0a294637ca499ab8ca963bb6cc7330155f278a529539dde5f10f7ef641a23ff6577b8ff68566690619ed4ba7feccbcb7a5e595f265cfff5cbe60c5e2e191f92", 0x9a}], 0x5, 0x0, 0x0, 0x10}, {0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000002400)="d46c586d3241cb0f6d63e9db906b58c4883b178f832b2ddf078f72329c9623dff0b3fb", 0x23}, {&(0x7f0000002440)="64eb082d6b7cd02679a9b787362ace951b73fba91bd4c4261579205df0e4e4549e2bdc5e5a5a90dc11a5631743616b2296b1aa9e57c3bae357782cb734b619ee2e1065303c8aa474dc4f225beab03c716c8b23177f1a9d9c87a304944a38a45364ef4e41850dd2e5d703596e2079161843aca7de15161591d7bc55a6395ba31a78a3", 0x82}, {&(0x7f0000002500)="96eab8357755a38e6cf45c61037934cddb1ca466dbbc6367fa78ac4de51330763ab316dfb4daa9a3", 0x28}], 0x3, &(0x7f0000002580)=[@iv={0xe0, 0x117, 0x2, 0xc5, "8773c0cae61ae9b0160f17de36475fb9ec61ba71fcc00ac43be91b5b575f2fece9bb36c6ccb25baa562798983623c1cb519e5ae5d1ecb32fbb258ed0c398d1bcdd6dccde08b2de83d777b2578a09efc9924af442cadafbec031c6184b475de5582938fb8f18bc467a95fbdc5e5391c1dc4e73a58bc92b34b9a64ca0e51e57d6151cd15cf3e5704f8baee41afbb708cbe08561f8ddb9ff2f862ace62102badcfcdad46164ca41a64ea2305deb6f1f3dea439f5f0485512b872c2312189c5e4af83d6f7e9fbe"}, @assoc={0x18, 0x117, 0x4, 0x4}, @iv={0x70, 0x117, 0x2, 0x5a, "1fe8968926c5653d202daca52f1a5191824d3e5a6d3633c57ac387e740ff34859ad44b5b125f1cdd7cb2e292159ee19508e3115677e9060c0eb588d2efdfb47c35a26246eda0db18074128c34347509b00254bdb3067c3f7f96c"}, @assoc={0x18, 0x117, 0x4, 0x6}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x8001}, @assoc={0x18, 0x117, 0x4, 0x4}, @iv={0x80, 0x117, 0x2, 0x65, "64fc2a04498d587b62bc7b814968c1245abbccddd5f716f9a6d6dd2a0f8a71463023ac9217845ae7b7cf96bfde149b3b55775f75c450badd873c93c92425d4e7f3b85faaa3df6720a408970cd96153e14a2d5e802702df400f49716ddd9a771c303bf2b6b0"}, @op={0x18}, @iv={0xa0, 0x117, 0x2, 0x86, "eec30a6757a488de73f82e85cdfff207e21be7051764861aff728877100766b6c83ba95298ff5ab1631ba2419483c7e00bca87ed4de0a8bdb64de4e15c48097fa2e87e7ae512aa10159d1e72977d71a111bdebcb75b0fba48181472dcbb9f14685562497644acede106824a94c05f8f829dc80785c0331b3d45de7611fe762c83f7b7473711b"}], 0x300, 0x40000}, {0x0, 0x0, &(0x7f0000003c40)=[{&(0x7f0000002880)="3dc396edd4096644c20e", 0xa}, {&(0x7f00000028c0)="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", 0xfb}, {&(0x7f00000029c0)="42f14e68665698d5f509b28619275424fb1e91bc6c240448c5a4bc4f98863bf1fda7b841740a753639f69eba39e76b70500e501397ba1f8f0fae8ca2bed69969420331b1aed6123d5b8ba631d3153e94", 0x50}, {&(0x7f0000002a40)='c', 0x1}, {&(0x7f0000002a80)="22b052e7beefd271dfc2b421c366d078ec1af4e15e49ff2c8d94ecb086e913932c13b79541ea935e615714f1947aa099bcfd6cd3e6cf8062df210cb609010bf4982eea13ff80efef14854ff8ba9f1575b9d4e98f", 0x54}, {&(0x7f0000002b00)="6c1f03f121d9ae89fb0dd0c38c76d754a23e5c30043986660619f664284fe4e5e90c4ec28bcfabc70118efb19535bf5880be72a69a1f8b39d12d936fb56ca10c5130c015766be168adb388e67ff79fc5625f5f85f01bcd94f7baf454b4f537da69cdceb3935f2552210e85f1ad340861541fdeec65161391bb68939483cdb8bd3088f7f59fe21ef582d1396ba9721820488b57b2d7908e0c2e90aa2fa7fbf0ce1956310f953bef716cff1165f2ebf3e2717b8fc1e414105d28f2d2f135e426f2f0641cce87c9f2af699272cdeba0067708e942a75e20ca47bb7ec0bd09b78a8165328c4434fe96ff9724fa2994f3e1e08582b4eaf9", 0xf5}, {&(0x7f0000002c00)="9142365f816b0ea33522eddff3a4d8d0638cc63b1c95c548ad2ec0ff68ee3db8f0208b8d53381d", 0x27}, {&(0x7f0000002c40)="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", 0x1000}], 0x8, &(0x7f0000003cc0)=[@assoc={0x18, 0x117, 0x4, 0x9}], 0x18, 0x8805}], 0x5, 0x20000040) sendmsg$nl_route_sched(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000024000b0f0000bb24284d090288290000", @ANYRES32=r11, @ANYBLOB="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"], 0x30}}, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'ip_vti0\x00', r11}) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfa) 13:43:00 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x541b, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x5, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:00 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:43:00 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_SET_BSS(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r4, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x7fffffff}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f0000000040)={0x9b0000, 0x0, 0x100, r3, 0x0, &(0x7f0000000000)={0x9b0954, 0xfffffff7, [], @value64=0x7fff}}) ioctl$VT_RELDISP(r6, 0x5605) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r7, 0x40087703, 0xfffffffe) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001240)) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r7, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) fchmod(r3, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) lseek(r7, 0x4, 0x0) [ 2419.364832][T32133] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:43:00 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x5421, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:00 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) [ 2419.452490][T32133] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:43:00 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000000)=0x8, 0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x6, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:00 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0xa4d8e24260319656, 0x0) lseek(r0, 0x0, 0x0) 13:43:00 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:43:00 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x5450, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:00 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x32140, 0x0) lseek(r0, 0x410e, 0x0) 13:43:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x7, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRESOCT, @ANYRES32], 0x38}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x24, r4, 0x400, 0x70bd2a, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x9}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x8000) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000a80)={0x0, &(0x7f0000000540)}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000240), 0xffffffffffffff8f) shutdown(0xffffffffffffffff, 0x1) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="010000005796eee87ee701fd8af61719dfbd4ffb391a3d75c18bcf9ace94f0c4dde7c7707e6798654f8a6ade35caaf5a7391fa3d6e02f657d4c307b39c00fe2d06f42afddb3eb716ffd6ab7062a1fecbf84e3987776f3aa8e15d2ca91790eea9704fcd20b18a0ec6ba35cdd42aa1ba84749781a85552f1721f98da98f7b0537f35e6aaf022a1e28330d09279c29e779a4b8a9f6d0136cd082a48c56ac79e5d1b89582af204c7402cd78c4ee8b6c5c5f189d6be87e26bbae5020359ef0de1140f2e473d8d43e34a3b2ed4357abceaae9619", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=r7, @ANYBLOB="016fd2b40f00000021"], &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000002c0)={0x1, 0x3, 0x4, 0x1, 0x80000000, 0x4, 0x8, 0x80, r7}, &(0x7f0000000300)=0x20) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000340)=r8, 0x4) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r5, 0x0) ioctl$ASHMEM_SET_NAME(r5, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:00 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x410082, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:00 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:43:00 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x5451, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:00 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000000)={0x79, 0x0, [0x200, 0x3, 0x7, 0x10000]}) 13:43:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x8, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:00 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:43:01 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000001, 0x4000010, r1, 0x3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:01 executing program 0: syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x71, 0x1, {{0x4}, 0x5}}, 0x18) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0x7, 0x682801) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) socket$inet6(0xa, 0x1, 0x97) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x12\xc1=y\x83$\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\t\x00\x00\x00\x00\x00\x00\x00-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\a\x00\xf0:\xfd$\xad\xbb\x00\x00\x00\x00\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f\xfe\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\x9e}\x89\xff\x8c\xd7\x179f\xe3K\x0e:\x91\xfb\xdf\x83\x98\xba)\xfcJ\x8e\x9b\xbf\x85\xb0\xec\x11K\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\x8a0I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\x01\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\xe1\xb8\xae\xe7E\xa6') creat(&(0x7f0000000040)='./file0\x00', 0xb) 13:43:01 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x5452, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:01 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x600200, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000040)={0x2f, 0x2b, [], [@calipso={0x7, 0x50, {0x3, 0x12, 0x0, 0x9, [0x0, 0x401, 0x3, 0x8b, 0x94, 0x1f, 0x7, 0x5, 0x2]}}, @hao={0xc9, 0x10, @local}, @generic={0x9, 0xf3, "54f09767d82936e24118d344d1277a0138ce9961e3f84169b50c47cd2fd38e5c022753b5f7475081f0069d83b3ca43465cbd5b46142c4072ae2f869233415f1b852bbf3fe052a55a95a7ad1a739bc2be76a51605874f7fa496b32c9b4dffa0977411120ab5c67531557b3c9c9726bf1bacef9bd4e072eb21df641641e8ebe80e879d522e0c4211ef530faa96da565cff5134266715e37d2a86ec18cc9589c89b492dfcac3bed7eab1adc7657a58682c5221a26e99307e75482c25df6c1071897a469828700dbcae6003817495651f4c6088581258bdc84cc0b8b73c9e5285bc87e399d1f8dc5207d8e0d547fafb04794a56a8e"}]}, 0x168) lseek(r0, 0x0, 0x0) 13:43:01 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:43:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x9, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:01 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000010", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000000)={r6, 0x10001}, &(0x7f0000000040)=0x8) 13:43:01 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x5460, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:01 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:43:01 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000000)='bond0\x00') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:01 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_SET_KEEP_ORPHAN(r3, 0x2287, &(0x7f0000000000)) 13:43:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0xa, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:01 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x6364, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:01 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:43:01 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4(r3, 0x0, &(0x7f0000000000), 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000702000/0x2000)=nil, 0x2000}, &(0x7f0000000180)=0x10) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:01 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r0, 0x8004551a, 0x0) lseek(r0, 0xe840, 0x0) 13:43:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0xb, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:01 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:43:02 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() tkill(r3, 0x1004000000013) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1b, 0x2, @tid=r3}, &(0x7f0000000040)) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:02 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x7704, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:02 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x587080, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "307790f86e397267621a8b9d61d55a08"}, 0x11, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000140)=0x4) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@rand_addr=0x64010101, @broadcast}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDGETMODE(r5, 0x4b3b, &(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_SET_VAPIC_ADDR(r8, 0x4008ae93, &(0x7f0000000280)=0x4000) syz_open_dev$vcsu(&(0x7f0000000240)='/dev/vcsu#\x00', 0x9, 0x300) openat$nvram(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvram\x00', 0x10900, 0x0) 13:43:02 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x321000, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:02 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) lseek(r0, 0x4, 0x2) 13:43:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0xc, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:02 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) lseek(r0, 0x4, 0x2) 13:43:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0xd, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:02 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x7706, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:02 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x100000000) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:02 executing program 4: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000100)=0xfff) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) lseek(r0, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x410000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000040)={0x4, 0x9, 0x0, 'queue1\x00', 0xffffffff}) 13:43:02 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) lseek(r0, 0x4, 0x2) 13:43:05 executing program 1: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGPROP(r6, 0x80404509, &(0x7f00000000c0)=""/27) readlinkat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/44, 0x2c) lseek(0xffffffffffffffff, 0x4, 0x4) 13:43:05 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000702000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r3, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xb3wV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xd2\x02;)\x0e\x1b\xdc\xaa\xea\xf7\xaf\x95\x83=\t7\x96\t\xad\xd0\xd0\xee\x9c\xb62\bu\xba\xfe\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdf\x80(Q=v-<\r\xac\xfc\x82\x1c\xf4\xd5\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oc\xe9(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1eF\xe9r\x82\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99}\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\x00'/226) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x3) r4 = socket$isdn(0x22, 0x3, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000000)={{0x3, 0x0, @identifier="98c001319b8b05df83ab66c12a60da59"}}) 13:43:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0xe, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:05 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x7709, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x4, 0x2) 13:43:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="93b20000000000000000010000000000000001410000001c001700020000eeffffff6575683a73"], 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r5, 0x400, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000001) [ 2424.361273][T32307] tipc: Enabling of bearer rejected, media not registered 13:43:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x4, 0x2) 13:43:05 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x770a, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:05 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0xc0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040), 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0xf, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:05 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x400080, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000000)={0x7}, 0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x7, 0x1, 0x5, 0x0, 0x0, {0x3, 0x0, 0x4}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x8804) 13:43:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x4, 0x2) 13:43:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x11, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:05 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x8912, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) timerfd_settime(r1, 0x1, &(0x7f0000000040), &(0x7f0000000080)) 13:43:05 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x12, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x8933, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:06 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) finit_module(r2, &(0x7f0000000000)='!\x00', 0x0) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) dup3(r0, r1, 0x80000) 13:43:06 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x20, 0x20100) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000005900)=[{{&(0x7f00000000c0)=@caif, 0x80, &(0x7f0000000780)=[{&(0x7f0000000240)=""/123, 0x7b}, {&(0x7f00000002c0)=""/176, 0xb0}, {&(0x7f0000000140)=""/30, 0x1e}, {&(0x7f00000001c0)}, {&(0x7f0000000380)=""/158, 0x9e}, {&(0x7f0000000440)=""/20, 0x14}, {&(0x7f0000000480)=""/238, 0xee}, {&(0x7f0000005c80)=""/152, 0x98}, {&(0x7f0000000640)=""/145, 0x91}, {&(0x7f0000000700)=""/88, 0x58}], 0xa}, 0x8}, {{&(0x7f0000000840)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f00000009c0)=[{&(0x7f00000008c0)=""/59, 0x3b}, {&(0x7f0000000900)}, {&(0x7f0000000940)=""/109, 0x6d}], 0x3, &(0x7f0000000a00)=""/231, 0xe7}, 0x7fffffff}, {{&(0x7f0000000b00)=@nfc, 0x80, &(0x7f0000000b80), 0x0, &(0x7f0000000bc0)=""/14, 0xe}, 0x5162c22a}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000c00)}], 0x1}, 0xd677}, {{&(0x7f0000000c80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000d00)=""/189, 0xbd}], 0x1, &(0x7f0000000e00)=""/36, 0x24}, 0x6}, {{&(0x7f0000000e40)=@nl=@unspec, 0x80, &(0x7f0000002200)=[{&(0x7f0000000ec0)=""/4096, 0x1000}, {&(0x7f0000001ec0)=""/106, 0x6a}, {&(0x7f0000001f40)}, {&(0x7f0000001f80)=""/19, 0x13}, {&(0x7f0000001fc0)=""/20, 0x14}, {&(0x7f0000002000)=""/87, 0x57}, {&(0x7f0000002080)=""/133, 0x85}, {&(0x7f0000002140)=""/183, 0xb7}], 0x8, &(0x7f0000002280)=""/37, 0x25}, 0x7}, {{0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f00000022c0)=""/207, 0xcf}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/215, 0xd7}], 0x3, &(0x7f0000003500)=""/141, 0x8d}, 0x40}, {{&(0x7f00000035c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80, &(0x7f0000005880)=[{&(0x7f0000003640)=""/34, 0x22}, {&(0x7f0000003680)=""/4096, 0x1000}, {&(0x7f0000004680)=""/105, 0x69}, {&(0x7f0000004700)=""/113, 0x71}, {&(0x7f0000004780)=""/208, 0xd0}, {&(0x7f0000004880)=""/4096, 0x1000}], 0x6}, 0x100}], 0x8, 0x60, &(0x7f0000005b00)={0x77359400}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000005c40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000005c00)={&(0x7f0000005b40)={0x98, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xdee0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x5}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r4}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r11}]}]}, 0x98}}, 0x4040800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r12, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:06 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 13:43:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xae01, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x14, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:06 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:06 executing program 4: r0 = semget$private(0x0, 0x4, 0x4a2) semctl$GETNCNT(r0, 0x2, 0xe, &(0x7f0000000040)=""/155) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x480100, 0x0) lseek(r1, 0x0, 0x0) mmap(&(0x7f0000ff0000/0xe000)=nil, 0xe000, 0x4, 0x4000010, r1, 0x982c2000) 13:43:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xae41, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:06 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 13:43:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x2f, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:06 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:43:06 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r3, 0x8004551a, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000000)={0xfffffff7, 0x7, 0x1, 0xb3d1, 0x2}) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:06 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 13:43:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xae80, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x400454ca, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:06 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0xc0400, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) fcntl$setflags(r1, 0x2, 0x0) lseek(r0, 0x0, 0x0) 13:43:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x73, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:06 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xc) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = gettid() tkill(r4, 0x1004000000013) sched_setscheduler(r4, 0x5, &(0x7f0000000000)=0x9) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:06 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r1 = semget$private(0x0, 0x0, 0x0) semctl$GETNCNT(r1, 0x0, 0x10, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x11, &(0x7f0000000180)=0x4, 0x4) semctl$GETNCNT(r1, 0x3, 0xe, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000001c0)) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000000)=""/95) 13:43:06 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x4, 0x2) 13:43:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40046207, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x7c5, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:06 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) lseek(r0, 0x8, 0x2) 13:43:06 executing program 5 (fault-call:6 fault-nth:0): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:06 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x8a2f000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x1aBn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdb\xff\xff\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:07 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40049409, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:07 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000000)="800adbbe1f2a90f6fef76569da9d4573002c99f271a9eee5820dc97604e462f8cfaa54b18b3cc1a5fc9523fa1c826769d9a444ff3e2b54e5d44e25b7ff669a01eeb642b85c58f9efba2e07369b719a9d63f6642db0d5bf7cb0bbbe56abda0467bd95785608a20c62f2713d5ac28b31a1f979ffdf37865f445434c38c28a35a3a5244c301707dbf1a808a74fba29150d8300d9f8d1166fc5d401447cd82c6d117bc8ca95b32dd7551741b410de46b751eaf4876111c7fec64af30edada495c8eb4d4ec16a71e1620345fc04a31502d309be2426a6e04c650c7492f9df38f16083caf7102a0bce1233", 0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$tipc(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)="12620b5c3f319577e3d90e5448958f6301849e09536be7a7664443551109a8408ce87052dacf2e34da7d909982fbd1347998bdd5943345bb1b8b7f1f5390", 0x3e}, {&(0x7f0000000140)="675f399b96e587453818989c69f0bfaf81a0841fc1", 0x15}, {&(0x7f0000000180)="755eb0f308e1ceb48272112e1408e5044189fd2cd61632c0c5ea529f9cb47691b0f642f28bab2219292aa44c459a4e067504ec5e6c199e60746272ceee4d6aedc4f64cd98f79dd23de2cf273906577f819becbd7e3ab72a037801d3bce817a", 0x5f}, {&(0x7f0000000240)="d02ac5db9b9e87e0dfee40fe48999e67aa279bc03dcf30a256f7011f7c357c1e03f5187a776f08972fbc6958a3f3ffc1072c8be264aca19903238598d38625affb3baefe995898129bd7e588024d68a94f514753110273fe9f3a2ec5904787ab9fa1514189933788f9af3eb47594807d81", 0x71}], 0x4, &(0x7f0000000300)="52e22d2147af1bb981bebbc6aa297501dac87de515933e89942a045ad0344ea37fa12896837abab54882df085e7f2cb39cce4f5afad1dea66b98862d6daf0582a9172bddba57c970277e207de7c69533ef20a4f6a70b72468b3a2e86eb8db1e2db45f6ef95caf8de0d615e8a0c6fb79b9c6fa063b779c7e2c0bdc86b2bd36ec84ee2e244a781bcdb73fadfdbf5eb824f8c8317e0224ca79f6ddfe13e92be7c8109387fca62322cd3bf93df4aff8665a832c9cc05d30ee73ca7689792b0f9d0301dc79fa852fd4ccd4a841ce54054ec3d27a703d8405b3e2b98623c2b370dda47aa78ed7b3b97aadd76b9776844c35966ab60d52dff63514f2de86f13f501c1408f7d01184bcdd28b8662cb177169abb94ba2762700119544dc18c97e7d9955a3057e2328c504bbe7b6f6769aa1d57361058afe68c819f29d8f57d7279dede22d383ad7a3c6e17845eaafee973616f0926b1a6906ade88ca3edb817a279b9fb0fccadf63829edc68dd20b5a81176d89c74a3a7e92867a523d1725fafaf3fd2f671c3cf3bf254f4926581f6dbc730ca2224ac1f31059b066c11dfdf80cb20b1d431476d6b67dd7c238506422d4ca3de195aa34ddcc10fd803349c47f3eb71824c61d953c9bf42179d4009db570212ad6f40e4aba1239b77445e70850f4c9ebc68c74a8c53ea6c1d61eb90a3267f113a978cf8a57dcbc3adf447cdd639f03050028974db6cd2e1edf86cb4beb652b6f79304827acbd81a470c68b4869f8a253cd575ae4a59aac99e41b6a8c13042d7c32ad3c1819fb0e4e0608506046c8e2f5e675d4032a38968eaa39243af77879df777665c13487e17a560dc567300cc330d64274993cb0b5c8a10d62a97ec2ccefbad5d749920bcc68775bb8d6652ab66510086972d1020c40309bc0f72e587920b1cb356c97ed9004f5b5bfde4cdb6c798f4c39769fae6722208e3f3d7ae0d2473f0d64b86d7ec1ef1d4e737fea0d627c20bcdaa124729708dc8d94a74f8cae6eb4c035bdf8f314bb043991c908e04390f225d6f18f6294f593e840c6e445df4c3a520f8c89e78a4e6143fe9b48c4256d95b3b14e55ba0ee80e9fd75c28622569ae33f264538adb165b86ef62de9b5efba096f8e8d0febace72bb4ba72ea94c8e91f5ff5ebce6f5ebc47d7ea6b74b1207c3dc252a945592b92b7dc2c8c88b8b3b5b92d6a931299be8ded721944eec7a3b1f07f366d98054b406dd6f917ea1756fe921e4ebc03cc24a0d7e262c28fc5b2192c054fb72580f87502d512f7107ff29c7159367da991bffddbff3971fcc465c4dea060d105dcf094ae064ad7682f15c0bfa67a27c4c96f3c60e4657e0f399cd570bbb5af1966c887def59cd00017aec436af65933aaedea45f3b38ea2438aded5d1fd297d1e435ee15c58ff867cece6b23de6ca01e912fab6b0e539d29651fd904fc9e64207bf4d86b2a8206f1302060340e78e1a65b78e1b5764579adf7b4a2fcbc82eff47ac54eb5c23a4d300c635efafe1b2fb09b52f1459c49b9bf895121b069ec59c63a7cb0a7e87b00da95fbb8092667d06508f72fda85b2567cc908c64f3e08d775f487a6ea9230df9795bf46b682f9f245b24c57b9126d98921f543c744068a856dd5a666770b393155798ececfd86df680a61690a08d98f854fce69f9b19bda07128c53902faea1098abbed2b3ab3b94f1d825170f4795b93ab3c79f8093a3533115380128b7c519ace254a32f544d66bdffe3e336c6bff7b6678bf5acdcc75b40eb1e8505eae1e71b633baa0b3e94170e233814a03ba4daf3f57b32ecb38578690b3288f6ed601aa5de900bf407366404f7dc9bfa31932dd28f22c3dee10b01b26d931cb0ffb3e3494d2f0b6489c1221403b08d7c262b841790b85ac6a070148fff4817551fa8e07b44cf642b9228ac27b1090f081ad0753317f46e31e1bc3715389e12d50483878d353fbf565733185276a4015d0c01a95875fc8a6451ff9edf2a9780c6395482d5b08739c7a2c3707b599a24e41ec385435d3c6af4f96cc3893ad29352695623838f587876454ae73b59069d5b9649d68bd3cbc6c61985bbe8a6df0387a0c6362fa99ce9846b54e0157c22b72855e0c275ce7514f82ac6a676455011356538c7f7e02fa18813b761773fc9dd789d0aad2e78b125b0184ef2e6176d18784eb227cb5000769a8f30d20f5dd241cf4dce53b373369cc64ff9cdd08d74ccf5c73295a8bed28cb93815b6ee9cb387cf3fa1f66d272301088e07df6573e40ce67caca870fd43f64191a1592789b5f9fc8ef23f3279d41f2e11d52f6b7438bcb7288ae3783a1a3556c0fc21efa354f6762c9f6202d7640b8884577bc4a661002402e0026f8d65ab6c164c08540e3ef04461d44d18e7cb8dd78c3e2618476319ab952c6ce4ffddcfd17200bc53fc377aee78d022b410f34c5803bcaa2fb6c8b0c16890c2327f3f34f5663ee0e0ad2171296029e82c7270e1ef0ff1c2b6bce299c36286353b039d45ec6521474c8cd6f09fcd5e8cc4dd7fcaba45b3298a3d78cbd862ada259ed4b64d1ebac40cb0c2e7d600d08ecda93ef810a3de262e7485ffbf995677b36081765f014b6b6ccb471ab92b4bfe8fc33b37e69819355a10c21b872b127bd5aa9d12e3f9da515029d8785488a569f9dec302faac70a0a655912ace75da8981ec285c9266476da26480f33ed4a565c729afdf91762c1ae8f83c004f52a10e9b032e3c99549a66b7e7434de265086f79228e82c4bdd2bdb079d25930fed425091e84cf720003965d822566b347c0a5f83d96e0fb18ea915f5f10e0d7f72ff5e57f3d049a38c1c0f20d3b726bdc311e8382e0aa385f4041d0b772ee7aa7ee3ff99b3ab3783b27f6c1b51e0c7b886e7c992786e923f5928ab811f202959f5f1e11c1d56f610052def8290dad3622138397624b3117e56a795e6aa0fb61e27443795777c73ec5e1ef8de09008750d957dc49ac1c0f90b7ba2cfb1dc6a711ca7cb6c92bd43b9221e30b956aea9a557c5f55350bce82478d908c2d70b600d4fab222ef9e62cabeda991a67379be1f9b5b05c0b545e4c19203147689b1405fa1fdffe1b4527b7312c18b04b420a904496207d10d433ec579c290bde63811a5ad3f8f7f5d51e29bdec365265bd962222022d74c966077a08f62fa5da11de0e93be5f839a9e0fc4d0adaf99b949e7853a1ed40236bcfe58cefa08e0b681d4dc289dc580759ed976bad1fd582c4a6772497fcbfbe6654183c3c2d998b37e6b8c5ce4f2ccc970473f043f157ba7b99a0ea12a18a5f20f69aff9cdaf5da54b419b3bf2e46bb8b658a878bc378743071b3916481070aa06596b83dd20d4b4c1a3c3e9d60f92e0e7f10975b1fe07b9d20e65756f57409449f68f81464a6d480e35c3fd031fb842816fa06ef3cd5b985ced170edce68db6df1f6d08a03c8163c73294766130e76422ba4f60cfd6fefcd946a7baba08dc32cec49139c582b9bd6cfb7d416b547b26e2027289fdb12ca965e9c9a5b17396e42604c8f0c8f79cac77697d7fcb9a4b374e2f2ede7fd056ede944cb59e91bd21e97972627915c3f1c794eddaf4a088534198593a274668754eb5ffb2dae9457a85eca2453e6ac05f552dd77608ccf5de3335c6283fc28b2bb0ae99f08674476a6377ff9cdae550b6db6c61981a1886f99c2590c3b15ddd0305d71fe5e4dda1d99c359dd9d7cda42fe71efc6b8f947a924563edd1e034a3b2694885c4ad0a0a10b4e7930629d5c8027d9fb685b6651735eea3f0794ae36cdfe23e197e5363c96dcf693eef61589b306a8120b3e52147c0532530ccb27981a8a634e836dce3d7a9381314a071bfcd21bc28057723671d208070a57b21cd01824a70750f9a0c08a86f56549001989df9c6066bec358d4633447f1c3a28ae25fd4475863333027a59f969a494e10c638f202ee3feb39e83617454fc9533f42a78227099274d0c719596805dd30cc8044ead506bace25a68a2dc78788118a3911c28c7400798d0198c3eaad6558b3a102c499197d5e68eade14b5fc4fa67d470f54543c013856a3be2b981b280743f693510539999b24ce50bb723914ae9bd5068c66e4394584f42e0e65d9029ff79bfeba9121e5403c9d6911528e7d7078190439c1e89d92730c4382c79939d5440cdc183fbe1d8ac9a1f54c349e0bab2d9dcdbb21e228534ec3bf825e9ed6eaecfb4ddc2e2737597c611e61858aa6fb0523b5a42928f6c6c977061bff968b9dfc8a1926596a04541959030bf695d33dcd75223b8977749ba9e68a4254b4f964df0b462607dccfc464188cc859e5fb18240ec21238a9a9faf4161a04dcd7888ed6f9ff147da44bfdc84beefb5cda8fdae2f82aaad49fac6b42bc8ab0328f78510827e6892c0af4cb14d839e7f3188ce429098fec08657367793a0876acdc23e103bd6389a331ec4b40dbd8d8b12cbd9c6dca4b7eb1006748307b76ae86978dfa5ba0cb586add45c514e1d8616bc75cffc8a95609a330294c84b343a1914b5c2bc68387bb00da693e1be3a505dcd4d54fb2143d39893e1d6a64e73ab8a6123c8785709b3eaae79a229af8e815c13bbcd9342821e2648a7108f91e6c6ddbb6ed4458864a8ea091845c183cd5f15a072b3ad3c9893c07f14f3a91af35f99ee48ce9c7817bca4d95b6c7b026ebbd96608020fcfa96a9748a4a9e02dfac0efaa4ec1614f7298493901bdf6bc61f210e3389a55fee1da61bce9eecbe52d2e461a6daa863c1958b109362043fa5f0d1a1f532033468fb2ee2903d25f3ba78cf813c669cab61fc91db4850ad4faf524ec575306323aa3f8a9335a5bc13593540dd8e5c891db2b520846bcf8ceebaa93e360fa817346d6358cd6a57d2c7ada4c20fd02010a0ca6df023218e923763c8f99de1f2da72d5d8dcf70113bfe2da0e3d2004db18454666427323d94139b5a3adf2bac0d75d8cfd0123e32c1e17c8064deec3dbb47533e2b2034acbaea56330bffb5827655e5cc00c773d23f7685bbf9c8b94dc6f46afe2c8fb257b19db87fc6a98aa90ba86943c9dac76e8048a6fa84a5b6c4b6d1c4ad6c5d1ace4c7ff21413299a19ff23aca9c52ad8957e55771e11eb89ad08630791477112022b745c25ec87a35e4a81e85fc1f02852e0beacae845859a59110f7a8e030ab155a23d8083d2b57c558bab6d74343b844245c46ab42e264e04065d22bfbd2fde336e080255921b6c683e82485d8ac030d71249786adbceae60b13e1af68f62c2366cab009498db9cb5491a30b67655968808cd40d975d5c1c2f597d65f7b0de34d539bbab2bf69dea149e390c41743da6b0abdb06329447fb51c7729e467df69a94100ef2a72154bc2a35ecb3c86e32d965061e804c20b5884ede9e617c1e6e17c3fda0e609c7160e38e8483e96c061990e0001640a27cd432152b22d3e784479883fd72846a8618457f953e2c3b5042b4dee66b8e1ce886e6f77985593ce431e56f212c623c25e3d5a450b9b51c69615ab4677bbcfcad071eab299a5049b4b94cde32d6877ea606bb560ba524038e54505881ea8e7d76a2936982d4f207c55763ae0be38bc361aff364f57ac9da8bcdcbf1c0dbe6b639f615ccff17d36e1d223517b8394a0cd100b294193a48d820a0e7292624cf16d4423960ab16c292bfa644d8b81f8f9fea0524e6a0d761f2b0b3a060add0fa904ec668bffc99b1498313675ac567ee9939ed97e989da81b2d2373c70efa4b23942355c636eccbb5fa772bfceb329e2a2a3fd32f7c3c1c20fc3f9a15e19e94c81a04c7928", 0x1000, 0x410}, 0x24040041) lseek(r0, 0x0, 0x0) 13:43:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x7c6, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:07 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:09 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x4}}]}, 0x30}}, 0x0) bind(r3, &(0x7f0000000000)=@ll={0x11, 0x0, r5, 0x1, 0x85, 0x6, @link_local}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:09 executing program 0: syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:09 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087703, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:09 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)=0x2fc, 0x4) 13:43:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x402, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:09 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0xfeffffff, 0x2) 13:43:09 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087705, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:09 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0xfffffffe, 0x2) 13:43:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:09 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(0x0, r5, 0x0) r6 = gettid() tkill(r6, 0x1004000000013) sendmsg$nl_netfilter(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x1988, 0xb, 0xb, 0x5, 0x70bd27, 0x25dfdbfb, {0x1, 0x0, 0x2}, [@generic="762ad71ecd05b45a311f3c4a56299d0a4bce1fe4c0814708ef25512e676bd66cebcc4ae05b55b58d2c68ea98779fc74216746eaf9c3516982888e56bce512d0aaf95f5609fb78c58f742c8c5a2c8dc1274a15a2d0650a0336d203ccbb560e97e32b237f70ef624b11a9bfd4a9249f4a6e2cf21321f630f8a38910cbfc2344e840651b9f03bbfdc5c097f0feee29415437f92bb6bb8b858260c8994", @generic="5c04bd6c021d7652fcdd7d52100d593f2a37c50630ef15a653671cdd1dc7246ccca08b73814c14c779b679a89cc2584cfbc4c191874c801f59768b", @nested={0x1bd, 0x8b, 0x0, 0x1, [@generic="40136523c32a318667206cabb1caae432b34084ace9889559105641b4a621f5b33a575004033bed79eae6ba492230d9d41e23ae153e5ea22962a1e04dd9f7b69f2c7a60d96214dbe00bfeb37d0ab4a7d668f810b74de69136ad4555bceed86f5044e795a41117c2f02c1d669839c42e40a7a8e97a5c383c5a6e2f48996c207d9d0f592b3653968ab0aa246dbb3e57425128158cbfd8021b688828ddda449b0e1ed24d2ebc7688a187ce238c7fd2559a4ba06f9ebc6e4a8519b49cdb130ab1dbe58e8e66502c04026ac6388a61086a8c58ba38181c144eed9b0d2a14c1625b66426eb3c07144bf9591d033116a081040a8fa46e31", @generic='*~F', @generic="43ae6be098fa7094708874b33a1b9504bc37a83d5088d76058071069f02deafacfae900a4b42081bafba70560b40b126367f142977772b4259545932c5e8973f12d0e516a59642d6d42ab0435185ce4243b33ae70d8fe9952582522cd4debe91ca92e4d2c1ed415a53d0da3e3f7b2737c1f397dcbb258cf2a7c017a52c99f43688509c152ab6d9edcf608d117502d84a180a10c9f647c01ad00fd596d7ed2736099a01527a6bf0439d4864ccfdf13d7ada5f480a76093dba199594c812d89966b5b2"]}, @nested={0xb5, 0x17, 0x0, 0x1, [@generic="2c7825b21b62a9bf585e9b7fb407ab5adf26a1cc140a3895bb80f3d36b7a34409db8f7fcca489a7e5f6fbd21525f5e60130eb45d14b51946aa11015b2b7a9cd4776a2ca128d0cd8d32203c390c56b815", @generic="9531a0823ed56f211c00a12316ade868092d887c5bfcca8d8cc6eeaf358ed21439838e55191ac34d34185f6c4670e1e42828e3ea2f904e2693cff537f34d4c315314c7ace97298808f89400dbe18db0cbbdae4a861e0a25bc689571d263c51bb66"]}, @nested={0x5d, 0xe, 0x0, 0x1, [@generic="bfd8f1f7b82f7adf77", @typed={0x8, 0x1b, 0x0, 0x0, @uid=r5}, @typed={0x8, 0x53, 0x0, 0x0, @ipv4=@empty}, @typed={0x2c, 0x33, 0x0, 0x0, @binary="b93149f3ef5716bddf0ee6c693ffaf75d574294f12119799bc5e022df8283d4adcee13d2d8cadb6e"}, @typed={0x8, 0x88, 0x0, 0x0, @pid=r6}, @typed={0xc, 0x6b, 0x0, 0x0, @str='@.@-:{)\x00'}]}, @nested={0x5c3, 0x36, 0x0, 0x1, [@generic="6b57cc9d55ea10034cfdc2da625ce2ef6a73c5543c1b84d8900c44f210384ecb0b8d083afc72b80dce9b636cc38fb19e09f7ac7cdbf1", @generic="1c570df066b137ad0cd14c4cac0f1b4c33acb15e93b5e050e577bc0877d4589017695238a9c934d04bb9449dd5b5677642c194ebb7d8e19de4ae23755e5766e1dab9a841c2ca02ccf241b0ea33666932b55eabb34d197a89e9b0590c7041a895dafbfb24a0b5a9a722a452a1e73e2eae970b861377a7b866909d36b588f545941f56445f46cc37279e4dd7e12e5011e7456546905808b8f1ba3df10f2f35798754f6875074bb268721779327e763c31de62fa88ce4f93cfcf5215e11945491786168631e868d7cc82c82b4762acb6ec010c40db2e3845287638f1760602f0c125fda1c3abe", @generic="a8fc9259a4e15408660cfecc93b5cb4033bae6a2ea134adb03089b9e014ce349c1f1f10bae709a1cd50e22f49aa5ce516715a3849880d8caddfb89e888bde2a786a6e699754ca1792d61d7cbcbc7c00671900ddd88adb5932df73d45503d1c8a971f23c76907357f16b451654d77ddc682aa2d3da7b17b36e04910d1af1c3352d5f037255910a6fa9bea47a6ba1ef220c9daf81b3752f107f4ae00ea522ae134c9e9b1d8dd2d605a5c93213b26a20f2e8819bed614e015480867f5ff6107aa65", @typed={0xc1, 0x79, 0x0, 0x0, @binary="8b39f073f0c361d71fa20dce8838730859bf53206164960e7725940369622d89544e2d9d72d60b1361227ea303deb9ad0673b911c937e2a9815662360c131ac1d85507242ea93d13157c836f51f20ded4344f9499684a1be88bc2bd43d747b869b5a4ecf3d21a9c75d2c1d4e097871bc36b023d111261e056b8e959bccd58cb75ee6cb7727566ddbe3021d4ddcadbe1f720f1a97d24e0fab8c7f96957c50f69abaccf6ee47143614fb1426aced51d724a4b8168424e997cef7da4dc3fe"}, @generic="8f6d18ca91f9aff9b2a1bd63ee23f16fefef3dda0d78cdd19fc834c9899ab8c334c8c6e3ec5e1030440e3a1304d4e405296f026f3804f23c7d12caa6b41b4318dc91931518d335b6d2d0407d02e12bef9a1a1267b47907e03c7c1f43fa1bd1660b86f102cdc3ff1bd99789b872e99a1a64c41124e3f58f738f8b4943ff3d5f7b72028474d4b9b0", @generic="610aa2114d102dab4f21d13afddf478d3822b57a273e36458ca6ffcf1d10bc4d9fdddfa422e7ca986aa35e3d87f88b0e1a3d7e6f1935755874b63666cbbea1ae2cb0a9f11dec4437d053ff3588e3725643babcec06c5e5d70608f64e7693e0707f589139bc19da370805271faa85c1c9c25ff9183f5de5d68cff3b538f5a258ddbaa6c7a31616937f4bfb12a6efb9b2cce1f3bbaefb830f660cde8eb007b8732f62b06cfeaf6dfbe5fe606b4c81765c425ef656a215be2eff1ad9d76aca4", @generic="14b686ca5f4b2e66844d3d2c465ccc6c2ac5a99c4ae1bae3ed60d0b059d24371ce44e46efc47404fdab4a6a02d7c33f31cdaad103c2a934c2ae3b9097088d794b139ff9f6726d7c24a3948e2ecf25dc61e95db02c000f00d26417348cb687f00407c74cd48a09adc9a1d2564207a1f7a28312dd2bf5aa1a37e0481bc2bfc6ac8c744f1282affac3a1d378cc801cab4c9ed88fef8411bee75e3687cb9f735646431fd01e6505c6a79c490b2794bd055ec05f4ec888c56fbe1d063543df88f3a3a7e96aa3b106e0bf4916acae82a27fb1a92095345a888bfa4cfa3b348bcd848eaee924ad4868b7e050c5a678196f7d72890e6d3", @typed={0x8, 0x2f, 0x0, 0x0, @fd=r0}, @generic="87c0a477c46fa2679685bd5a0d5acd64f9f87dfc37dfe71a305b4db6188b391f95f1662ea24f22060dfb68fca7a2c40e233b39c4d7e43cb746f8f0beb339ab2d03852fd5f68683537d49cd7d187bf8b9edda1d6ffeb4bd32dac9ffc1ca9cdb1358c29f4954844887c3fa5c4ddbd9ce919daa5e1c413db803d7ec12cb4837846bc6877394f44bb746aec704a36d9b2d83210fd7e819a4c02cbf6bffd60e25ed6a0f471e665b00856e8719ab25401c95e8107994aec336986f32cbaa16d35324c09f400eeb4cc807a977b8eeaf", @typed={0x14, 0x14, 0x0, 0x0, @ipv6=@private0}]}, @generic="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"]}, 0x1988}, 0x1, 0x0, 0x0, 0x4008001}, 0x8000) 13:43:10 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') rt_sigreturn() ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:10 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r7, 0x8004551a, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r6, 0xc0205649, &(0x7f0000000040)={0xf000000, 0x1, 0x9, r7, 0x0, &(0x7f0000000000)={0x9b0953, 0x6, [], @ptr=0x7fff}}) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r10, &(0x7f0000000240)={0x0, 0xb203, &(0x7f0000000400)={&(0x7f0000000100)={0x6c, r9, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2, 0xdb}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r8, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0xc4, r9, 0x435, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xa5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xeb7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffc00c}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd096420}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x44801}, 0x4000) 13:43:10 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:10 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0xfeffffff00000000, 0x2) 13:43:10 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r3 = fcntl$dupfd(r2, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:10 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x791900, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x0, 0x457530b, 0x6}}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x20) r2 = socket$inet(0x2, 0x1, 0x0) listen(r2, 0x0) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000240)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:10 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x80045505, &(0x7f0000000000)=0x100) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x4, 0x4) 13:43:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x405, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:10 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 13:43:10 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087710, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:10 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000540)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1/$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5\x84]38') 13:43:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xc0, 0x84001) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000040)={0x8, 0x9}) lseek(r0, 0x0, 0x0) 13:43:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x408, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:13 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000040)={0x9}) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) ioctl$USBDEVFS_SETCONFIGURATION(r4, 0x80045505, &(0x7f0000000000)=0x200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:13 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) 13:43:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087713, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:13 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x4) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000040)={0x8, 0x8200, 0x101, 0x1, r6}, &(0x7f0000000180)=0x10) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:13 executing program 5: ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)=0x400008) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r6, 0x40505412, &(0x7f0000000040)={0x3, 0x9, 0xc4e, 0x0, 0xd}) lseek(r0, 0x0, 0x2) ioctl$SG_GET_COMMAND_Q(r6, 0x2270, &(0x7f00000000c0)) 13:43:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x4008ae89, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r4, 0x4010ae67, &(0x7f00000001c0)={0x10000, 0x117000}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)={0x7f, 0x101}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r5, 0x2, 0x70bd2f, 0x25dfdbfd, {{}, {}, {0x14, 0x18, {0x8000, @bearer=@udp='udp:syz1\x00'}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000044}, 0x20000040) lseek(r0, 0x0, 0x0) 13:43:13 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x282000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x409, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:13 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:13 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r8, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r8, 0x1) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r8, 0x84, 0x6d, &(0x7f00000000c0)={r10, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000080)={r10, @in6={{0xa, 0x4e21, 0x7, @remote, 0xffff}}, 0x400, 0x29d2}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000240)={r11, @in={{0x2, 0x4e22, @broadcast}}}, 0x84) lseek(r0, 0x0, 0x2) 13:43:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000080)={0x1f, 0x4, 0x4, 0x10800, 0x7, {r4, r5/1000+60000}, {0x3, 0x2, 0x1, 0x40, 0x6, 0xe3, "cae843a4"}, 0x800, 0x2, @planes=&(0x7f0000000040)={0x2, 0xb249, @mem_offset=0x401000, 0x4}, 0x1}) 13:43:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x4008ae90, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40186366, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:13 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:14 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x2, 0x200) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000180)={0x0, 0x5, 0x1, [], &(0x7f0000000040)=0x2}) 13:43:14 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) recvmmsg(r0, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f00000000c0)=0x800000) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x741400) 13:43:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x40a, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:14 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$kcm_KCM_RECV_DISABLE(r6, 0x119, 0x1, &(0x7f0000000000), 0x4) 13:43:14 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x4020940d, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:14 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap$snddsp(&(0x7f0000703000/0x1000)=nil, 0x1000, 0x2000000, 0x810, r5, 0x5000) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:14 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(0xffffffffffffffff, 0x1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={r3, 0x1, '!'}, &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x8f4d, 0x21, 0x1f, 0x3, 0x8c, 0x7, 0xfb}, 0x9c) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) r5 = fcntl$dupfd(r4, 0x406, r1) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x4002, 0x0) ioctl$VT_RESIZE(r6, 0x5609, &(0x7f0000000100)={0x16a7, 0xa000, 0x3f}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000000)={{0x21, 0x80}, 'port1\x00', 0xc8, 0x800, 0x7, 0x8, 0x3, 0x6, 0x1f, 0x0, 0x0, 0x40}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x40b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:14 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000000)={0xffffffffffffff94, 0x2, 0x0, [{0x9, 0x7ff, 0x3, 0x64, 0x7f, 0x0, 0x1f}, {0x4, 0x7, 0xc1, 0xff, 0x1, 0x1, 0xf2}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:14 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x4020ae46, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:14 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xffffc000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000000)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xe1\x83|:\bu\xba\xfc\xae\xc2\x19\xab\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8ct\xbc\xb6\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:14 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40286608, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:14 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPSET_CMD_TEST(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r5 = dup3(r1, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x101) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_G_OUTPUT(r11, 0x8004562e, &(0x7f0000000100)) lseek(r0, 0x4, 0x0) 13:43:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "92c25ce5c03f9375144841b9e4633452"}, 0x11, 0x1) lseek(r0, 0x0, 0x0) 13:43:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x5, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000040), 0x800) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000540)=@security={'security\x00', 0xe, 0x4, 0x548, 0xffffffff, 0x388, 0x0, 0x268, 0xffffffff, 0xffffffff, 0x478, 0x478, 0x478, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@ipv6={@private1={0xfc, 0x1, [], 0x1}, @local, [0xff, 0xff000000, 0x0, 0xffffffff], [0xff000000, 0xffffff00, 0x0, 0xffffffff], 'ip6erspan0\x00', 'hsr0\x00', {0xff}, {}, 0x3b, 0x8, 0x2, 0x14}, 0x0, 0x228, 0x268, 0x0, {}, [@common=@inet=@policy={{0x158, 'policy\x00'}, {[{@ipv4=@multicast2, [0xffffffff, 0xff000000, 0xff, 0xffffff00], @ipv6=@local, [0xffffffff, 0xff, 0xff], 0x4d4, 0x0, 0x6c, 0xd669587e7971f552, 0x7, 0x2}, {@ipv6=@remote, [0xffffffff, 0xffffffff, 0x0, 0xffffff00], @ipv4=@local, [0xffffffff, 0xffffffff, 0x5fbc1817a13c523, 0xffffffff], 0x4d6, 0x3505, 0x8d, 0x0, 0x12}, {@ipv6=@ipv4={[], [], @private=0xa010102}, [0xff, 0xff000000, 0xffffffff, 0xff], @ipv4=@broadcast, [0xffffffff, 0x0, 0xffffffff, 0xff000000], 0x4d5, 0x3500, 0x6, 0x1, 0x1c, 0x2}, {@ipv6=@rand_addr=' \x01\x00', [0xff000000, 0xffffffff, 0xffffffff, 0xffffff00], @ipv6=@empty, [0xff, 0xffffffff, 0xffffffff, 0xff000000], 0x4d4, 0x3500, 0x73, 0x1, 0x0, 0x8}], 0x9, 0x4}}, @common=@mh={{0x28, 'mh\x00'}, {'mz'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x3ff, 0xfffff770, 0x1, 0x800, 0x9, 0x47, 0x3]}}}, {{@ipv6={@remote, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0xffffffff, 0x0, 0xff, 0xffffffff], [0xffffffff, 0xffffffff, 0xff000000], 'vlan0\x00', 'veth1_virt_wifi\x00', {0xff}, {}, 0x1, 0x5, 0x2, 0x2}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {"62e4", 0x1}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x20, 0x9a}}]}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0xffff}}}, {{@ipv6={@local, @remote, [0x0, 0xffffff00, 0x0, 0xff000000], [0xff000000, 0xff, 0xffffffff, 0x7fffff00], 'veth0\x00', 'wg0\x00', {}, {}, 0x9bf744642771fbe7, 0x1f, 0x5, 0x30}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'rose0\x00', {0x10001}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a8) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x400000, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r3, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) r7 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r7, 0x8004551a, 0x0) fsetxattr$trusted_overlay_origin(r7, &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000280)='y\x00', 0x2, 0x3) 13:43:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x40f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:15 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$cgroup(r6, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 13:43:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x4090ae82, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:15 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:15 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r7, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r7, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r7, 0x1) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r7, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=r9, @ANYBLOB="01000000211fd131d1b3a1c9218c3b0d88b4de73449b42b9a4e1a087fc301671964f13c62f3cdcd2142ba04f867a391d706e37e7b1683dfe57c315cd86ebcf08e2b21c3cc99df853fbf86cd3092da2ec427b294cab34d8cd14acc06558044a3ca5e91bc2ed4f14ebab19af2f03a8d9fbdd02780e3251b05bbf05cedfbcee5c3fcee372bd2e1c73b7c8789c304ac515620f1dbfa34693"], &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000080)={r9, @in={{0x2, 0x4e21, @multicast2}}}, &(0x7f0000000140)=0x84) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f0000000000), &(0x7f0000000040)=0x4) lseek(r0, 0x8000, 0x0) 13:43:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 13:43:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x410, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:15 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x14, r8, 0x522f58c7ff5ac33d}, 0x14}}, 0x0) sendmsg$FOU_CMD_GET(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, r8, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e23}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @private2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0x1) lseek(r0, 0x0, 0x2) 13:43:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x4138ae84, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:15 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r4, 0x6, 0x2f, &(0x7f0000000240)=""/137, &(0x7f00000001c0)=0x89) splice(r1, &(0x7f0000000000)=0x2, r0, &(0x7f0000000040)=0x5, 0x2, 0x2) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:15 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x800100000002) mmap(&(0x7f0000703000/0x4000)=nil, 0x4000, 0x0, 0x80010, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x1b) ioctl$RTC_UIE_ON(r5, 0x7003) r9 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = accept4$packet(r9, 0x0, &(0x7f0000000040), 0x800) getsockopt$packet_buf(r10, 0x107, 0x2, &(0x7f00000000c0)=""/52, &(0x7f0000000080)=0x34) 13:43:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x414, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x80086301, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:15 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000180)={0x57a, 0x0, 0x64, &(0x7f0000000000)="dd8ebfe8d759dc2e60ba148deb22b394077ff6891d102b382f1d29c608b696dee4a7828d52139ab02971cb8fa545fd652b3e6ffd60987e7920f74fe480d98d2432aac16846e4f832e31adea203af85221feb48453132f76cd3ca2f3e22a5204f2346494b"}) 13:43:15 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r6, 0x7, 0x1}, &(0x7f0000000100)=0xc) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f0000000000)={0x8, {{0x2, 0x4e24, @rand_addr=0x64010102}}}, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:16 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPCONNDEL(r3, 0x400443c9, &(0x7f0000000600)={@none, 0x1}) ioctl$USBDEVFS_IOCTL(r0, 0x8004551a, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) r5 = dup3(r0, r4, 0x80000) setsockopt$PNPIPE_HANDLE(r5, 0x113, 0x3, &(0x7f00000001c0), 0x4) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x41, 0x0) r7 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0xecc1) ioctl$USBDEVFS_IOCTL(r7, 0x8004551a, 0x0) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045510, &(0x7f0000000000)=0x2) mmap$usbfs(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xa, 0x8010, r7, 0x30df) vmsplice(r6, &(0x7f0000000580)=[{&(0x7f0000000080)="ad981407601a4188a7f8e7aa565ba4300bbca767fb8b92254c9276b744e8a68a0e48abf67d4be9e342d8990fc7326e1718b44ac04eae735ab1526a345ebeb60031c85b1e9b77d7077cd2740894abd4952b018c06d56cb87ea58a7af947e31cd6fbe8248b28bad8f7a2b651fbc6437f7b6bf49f9d58eccb7d76d1849d1419010678569d50f31b54abdd9bd751cb4f346fc5", 0x91}, {&(0x7f0000000140)="ea1e1ec9186f59", 0x7}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="3623893e37e57547ed42d3e0ef7cad2b47812a8e350e1ca2fed984d2c699112c8209a9836e52f67dd756bf22eebc41866945b6376dbb229ea839e1d634f513ec551814600273d4f03bdb37461b4ca3fbb45cacc5551e2b66c8f8a2e9c5733d7dac5e61378e1b090ade6bbc4e4e0adad7d7a872d0dd36e20fb38a1c6bd939eab9962b62971637b5f6555533674fa4c285c4bb691730caf1f30d2029de53ac0cd0ed03e38c3dc17752d9f3bf07af79580233ce6c672a49b37a66a2845aa9", 0xbd}, {&(0x7f0000000300)="6ed83bfb6f0215b890cf4c339cbc1652fda56a77cc36e432eb555349b46d5e9d42c5588962b1963bf1dbb544735972a405d4842d2dd29f8012f28d2a62c8b3c41fd83e6cb9c16dee8108b3d25a6d89294ab93cf7f7", 0x55}, {&(0x7f0000000380)="df0454e429ebbef24cc1b2c401fa698319733a06a35b5ed65e9f8befb62f5a99488f863149af9ce242ab2f2b6e0f93421cbf92fdbef9e34134013e045b1be6dd613f1a219706d0988a4b40b5dd4ad6648e51754416b318312eef2f820b82433505e606abdf72e3f9fcce24d0315349039eae37b51f070938ee8f9f3a50928a1f80f370d2f9aeb93a775872030ff4c785b887935b8b938346cf215f49850758713b9f65fcbd4126f0163a2e87a9b3f1ab6110f9e0ffd93246fcd5d4c68e944fa72f481334d927ca5efef323b560b078bdccfb1c85b8cc8512e7021307fdbd63e8a62639", 0xe3}, {&(0x7f0000000480)="8b3a00236ffc05344e71f41b8639fff8f3b55025aeaa243866f8697a5096ee3168724ed5e1f7cfef6b3f35dbca9763a557b291ea1a9f8f7f703a07b6875308a9d3b573ae93a743620cf571995bd566b974babd49954d493827029bc94c93fb31b61a65be4076ead063d41f351f0a9e4432171a", 0x73}, {&(0x7f0000000500)="c3f9edd53d13233cde27df9b3bd7729ed401001a8cc509f56820f94c3eb205918c53f1f23d80856bab33f35f5003f0a1ae2482c5fbb73a8b1f9daa6d96231dc7213b5a8f7e5b7058cec9102fa53058ee658e1236ddf7edb4069718fd99890b0cbd8bc2a4367e7cd319e993c9715f6cebfe438aa4fd63", 0x76}], 0x8, 0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x4010, r7, 0x7902b000) lseek(r6, 0x0, 0x0) r8 = dup(0xffffffffffffffff) unlinkat(r8, &(0x7f0000000040)='./file0\x00', 0x0) 13:43:16 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) sync() mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:16 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x81007702, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:16 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffd) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x1000000, 0x2010, r0, 0xabf3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$read(0x0, &(0x7f0000000040)=""/194, 0xc2) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAGIC(r9, 0x80046402, &(0x7f0000000000)=0x1ff) r10 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r10, 0x8004551a, 0x0) lseek(r10, 0xfffffffffffffffd, 0x0) 13:43:16 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000100)={0x28, 0x0, 0x0, @host}, 0x10, 0x800) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept$unix(r3, &(0x7f0000000000), &(0x7f0000000080)=0x6e) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f00000000c0)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:16 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x0, 0x0) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f00000000c0)="3b32aee1de81493b5f830aaadd521b9140893787bb71eaba3871", 0x1a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(0x0, r9, 0x0) setuid(r9) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCSIG(r7, 0x40045436, 0x2b) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$IP_SET_OP_GET_BYINDEX(r10, 0x1, 0x53, &(0x7f0000000100)={0x7, 0x7, 0x4}, &(0x7f0000000140)=0x28) lseek(r0, 0x0, 0x2) 13:43:16 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x8108551b, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:16 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000180)=@isdn={0x22, 0x3f, 0x84, 0x1, 0x4}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000240)="865fb8f67d0ae4786987d19f4dda1d81a5f20842452b14ec1d0927e522d80b78c9f05f26928f84845d1893145adc7a8af59689ea90f0b02e172c8ceff2fe1c2dc7c14f4813db3ead1b36158e6808a77685a031648c384b9b123039e29950b0c089b304e2f85ee20142444107b48bd8c42a2da6e57ac8a68b85330df5021304c39806fd805752786acf84a26adad9db8900966bc02019beed", 0x98}], 0x2, &(0x7f0000001540)=[{0x88, 0x104, 0x8e, "8cb4836be25ee14fac6f69f0fa8799e50c1ec892c76f7f95c162706d130922dec46b8022025ae9ec32464f193ade1ba288f36c6ee5ca329807fc7a0506b9b1f0cf8eef38bca8e6cf0daa9c31c362d13da3cd96186828cca5fd50d6c20ba900081c06fc79d6d3d2f01b62dd3fab5e533682"}, {0x68, 0x10e, 0xfff, "de649d548607386e4a3eee976e240ad0c5717b2e351ce36df58c512ea6b366328b267b8863c2c8f4f012bef82427e077e8257d3a8366b49b5095f1073239cf59554d50b01e8168a847cd205b38af7c9f97a1375bd8155de3"}, {0x38, 0x105, 0x7fffffff, "a74025665ecd8edb108d2c81cfa7f276b5892415adb2d4fb7faf814600fc22064f0e4d"}, {0x110, 0x10a, 0x8, "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"}, {0x88, 0x104, 0x1, "35cd15010e9851e253a8327efcfdddfece970d7dafd1338d8c86fd81c1dd29550803584cd5006fb28a4c7a982482e4372970c241a72c3492a0bdac74a638813f4f2579ecbb7ca4662ad542b356dcbdf147826c460cc12a536e3561e5567b98abcf4ee3f10ab148e2fc3895ea597763d520f5"}, {0x1010, 0x117, 0x0, "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"}, {0xc8, 0x112, 0x9, "246152be7abd7509874e79b5b8bee91da1f273bd234ef71f9818ebf4e39c9fb23f43f99cc9eee6a0e0447f7a1b4e7fbc09a648805896a47834e4c6de994dbfad6976914585be002a5c636a86c91606b6610fd09d616984fa2b178d414598e4cddd17c4a6e2dc409b5424eebd499ca7555fa0f743be15951ff4a8b3b4aae73745c362e44f6cca70e79fbf8ea6a5b8a137f9bdf6efcb12e510ed75b6a02bb73355816221a00fef312f5e56f801a99b116ecf84"}, {0x1010, 0x109, 0x6, "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"}, {0x100, 0x89, 0x80000001, "e6815e7057c53567b635fe9f0ef79d653d0ab6ba1012a8cab0ad092760dbaa826cc1ef80f3a0e201821fc17f570510ba7ff657195011e299e30c791d35e6b8bd7db1b0729cd04552a2c1dc0379777e40339dbbafedb0529b85943045a495f653766933cd49a08d7f913bbeacc879fcdcb5735e9751e6b789b3c5f638b90ed963ef61d344f63f63c34be48dc19aec4bd7313dcb9423b2c69d3e24b0eae840cefbcfdd6b29020b045b23b91e93ad7ecf4a25fa6909513ad47f7890147e487427a2e4bf02270383d052ab0f38342afe661d733ed97e013becd0e2b90fa64d2d63b5a26f70feffd5eb5ddf7ffe29"}, {0xf8, 0x112, 0x9, "aefc73884860506a7e6f51b46c50a560496b3b0e4cbb37b8057c9fc42d7b34c0ef37735f8b78393057269c6250177614eee180eddeb009309ce4c748198d47830af5920c7d7334b7f80b2dd8abaa42b36f5b2de193c4a23d9d888d5d909c3cf718164cf5fd84da97c8188b204003f7d3e82ec2c8121bbd98b3166de4ac03022965701f09f1b0bb4e3d87309eed52a3cb15ab5a8e0c7040825a4396abba888d824cf8066b8235bef5ae9fc0ad91d0fd656310b9ddd658d06385e29e3ba7b06e1e0f6f5d0fd979d9dfd3af0f585293296b570f1d07495681eac2b3ace994ff05ef1193"}], 0x25a0}, 0x90) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:16 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0xffffffffffeffffe, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4280, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x8) 13:43:16 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x6) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r13, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0xa02) setsockopt$TIPC_GROUP_JOIN(r15, 0x10f, 0x87, &(0x7f0000000000)={0x40, 0x0, 0x1}, 0x10) lseek(r0, 0x4, 0x0) 13:43:16 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x8138ae83, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:16 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400000, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r4 = socket$inet6(0xa, 0x2, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/154, 0x9a) ioctl$HIDIOCAPPLICATION(r0, 0x4802, 0x8) dup3(r4, r3, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) r5 = dup2(r2, r0) ioctl$ASHMEM_SET_NAME(r5, 0x40087707, &(0x7f0000000540)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\x9a\xbe\xe2g\xf0\xa4\xd4j\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\x00\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7\xcbE\xa6\xe2\x9fk\xf5\xd2 H\xb6\xa0\x9d,\x97\x00\x0f\xa2*\xe7\x8dw\xe0]&,\xa4O\x92\xefbDb\xb4\x93\xc00xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGSND(r6, 0x8040451a, &(0x7f0000000000)=""/76) 13:43:16 executing program 4: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80802, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x244a03, 0x0) lseek(r0, 0x0, 0x0) 13:43:16 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r5, 0x41007701, &(0x7f0000000000)='*@i@,-{,\x00') r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:16 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xc0045878, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:16 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCNOTTY(r6, 0x5422) lseek(r0, 0x0, 0x2) 13:43:16 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x20100, 0x0) r1 = gettid() tkill(r1, 0x1004000000013) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='}].!\x00', 0xffffffffffffffff}, 0x30) capget(&(0x7f0000000080)={0x20071026, r2}, &(0x7f00000000c0)={0x3, 0xa4, 0xff, 0x5, 0x80, 0x7f}) lseek(r0, 0x0, 0x0) 13:43:17 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xc0045878, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:17 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write(r3, &(0x7f0000000540)="af9acea6cf6de9a9958281b633a46d0de0ae424559dd5e7164c013515f66b7f98cfbe4653b04512fca196809b7131a58f1c50b7861074a3be7a6e5d3dd30f2e75f5858d76e9add2ed41670a2af1f78822f81cb9e9be5827ed942add3a88f63480fae61de243c11f530509305b01c4cef691097b0ae1a811fa4e321601c62043ce1d6c4b4681142cb6d077f2a14c5e8c865685bd4411f4ef89839a73c92260d6d674964fdbe9676d55105b50520e4435b21666a039ac920f34b2ebc2a84fc15ee503a74770c362455d7199d679da2d471639c91731db0b11fb8a737722dc63eaaffa3daf960b49f679ef4a5a8585e81bf6b57b3ffb37ecfdfc5772075f59b6ac21cbe979ae97dedbaa058defe66f1a7da14e4445ac01bdf2893d0b0898474736cfdf139f2b3cfcd29ee6c80582da40a9642bc1600d3692ca68672f90553bd9391d8be369311dd2a3aaafb21618434eefd4b74e419e65e167102813a8eef047ed121c7a2ef1d2806c9e0f852488cbb71e430bf54b0818094b6bd499846f67fb838a472df9c6ccd9e3bb5a38ef2178c50702cee4c0cf89de9fe80da2846a3048fe4bf145c644a87bf83100446a36f450a321e06738adde9a4c43734752149832f3587e7e36edea7803dc6c22ad0a4ef2c02edbc8731451714f6a0e0c12dbdf53a64458f249ce5754150af753dedeb3c0545009eeeacc3aabfb54b3ce411baee4f2a6a9536d44e6c6ba4f5f2616b71d51f1e6183a567c68e5e60efbb78487415ed13738ea45539dd9cbea49d932bb5db5256cb59674f8103b6fca0424ad896495990b62a0be87b7d85cbad872fca9329f0895b0069e0cfa6c010d0903d9cfb5b639d97191bb386d008abf483386e335c115e7f640dfccc7c996a89f449b1ae43b4fedf15248fb5d3af5ed026524f5911d8aafeafea41a3b70885e29a766b220a73afc884c5baa7d6ccbd14f07dd7661c86be658bb2f74acd0598c6bed8ef32d28e1ae07fe597c6eedfd415cb39253d957399461e9891895fc72521e8234633a82b0ed8b271ef4387e281fe200bd5f3a6bd9fcca16466bb346dd98956b1cf14f9aa6d8e649cad42398010bb014104f6fe4a7190d498d09d6e60b7d2b21de66787c47058d6fbb29eeae336798c2216ea498750af0401c205ebfc5566db10c1f1f38551faa653c703216b54f146eaa2361809c4e86929bf674a5c4a42cefc2465fdeb0c48f39a535dbd616068af8fa38da2357782db74dbce66f99c7ca40cbce2a6c90f50b957c1cb99a688d60a4c7656b9daf7baf515f7f8e17936d1c92ca60ceca2b0683442fb1ecef1b38003fcfba01007bf24ad9eac18bd47ce3f4f7f6cdbe4eda886087bd01f5096e690190764aba3b7bed9353067185ba49d1dad1130a5f5cd170b25bb055f279b7cc9afda3ad3831957fd24bf6a8c2c85635b2767afd9828a7db32806aeee7ab87eded0f920151e2bc87301ee7997e7fdb74430238a882633d159744376781eac2779fc83c1d59489b12de00840cab2e183163bbae00b25adcddfd4a1e738463caccaa4c8fcfef73885f0e8521671c2d7b791d657a590864273591e3e782cd3ef523da4396ef9851b4d8fed5b61e1bb1e501ce1f804b97ab6a8062631aeb96b259d3910d0c19735fc9469b808d9c4829646ca20e2e3c0af499022c6de90757dad27bd0094c0d0fc76feb1d21512a2dfdec244be9ff75604ae9ed93f60257c20693c5177beb2c9ed436d0d9305484cb9ba20dadacbb5a860a197d3fec4e53ac8ba75c370fd6a417ea0cbc7f6675ebc68ad7d17401bfd444733e2dcc3df664059ea9a53d8fecdcb6041f0096620507cf3137e3cb7c02bf3a3380c485999b56776bc12827e56601ffbbf7af0f205ccd63f44cd0f9c43b66a01a262649fcf4bc8ad34e0a32210ad86c9c57a6f433b5d1ba520c6027c74ddf5a864c7ea8c959550f2d392b9d2da4ea3daf8d348f1efdbe78c8ac1055a8aa1f5bdf574248ba0fa4cc4f297dd3ff7e24d41cb66ad08e8369ab6c18b784ad1c2b51d86f73abc7f0bfa30d7888cb5c318fbc97432fa4c8645dbd2c8eff5ba24f9bdbb09bef24c2673d003404672d3622d9a8c7c307a4d1b2f8b75bde5e15e34a05892fd94266454d0e2f242912a2651216f83585c8de9f6bcc7b3fe8b3ff0170a57e42f090009f2862dae1b2e81143bbc0d4b06588f7b6ff723882729ead245dab2b909c7f9843640a112daa498431b6ccfab61124178c0b1110c13dac094aefc56ed13cba0abf764f372bc0d7dead7163a8359a08724095c784e108f070ad1ea2f114779a375f22ad8d324ff96fb9d89fb2171d8c8d9052d7c4daa17c3dc5c6374d7ac52478b6867fa93b304be891c5f357e6f23542dcc6aac2e4809d3971f0308fa0eaa3b4fef207dd6628c2f4146d0baeea376df8dd3f1ced1e8685ee45a549f3d3dce5138c5b219cb2506932f281e7fd90999ac4dad072fee535c286ad71ba850348257abfbd59ab012f6f5b220ccd55527664c2e3d195278390db20d0911d1b8137a236b7a6b3a74dabb8bd3b0e707cde3e0dc161c94650b7160ec200b92c0bceadf98efa0eb188cc479a1a8840ec8f626165afecd83f95c33b47e63f9c3cc71423510065efa79cb82d74bbefef07af6b9dac1070ab3cda0efd44e98e71b5d6d653663668a4ab562e8646806d89c4b710250dfc3c66e1eec5261b65727912c342eba32628f6da338602d95193c7c5e34519c444c583fa63e61c3a0013f8660d8e1d4c224799417e00fec2be344a5cdcd757dee77ac0bc69d9c6408a31e3b781fb58d03752223e3a163a13a3932fd2e971085bf4014ac3ea38d2a611ed11ddc754e2e244d48facc2186319b1f4d245c73b6e28b3fe2958b5b3c8b40c774d5e95c4c6123cc39384a2901c6c2752505db45eb0ec7a9b1563d0364d076b0cd6ea3108cd52c0289ec98a652e3334e4ea51e3dec652cb41f2b61d572a6d7d648dda1c58a4c7bafcfaf763bed5edbcf85684624cecf1f06c325ad7856c1c762c855d4a900bae4b38e3762e8ce70e88a54f56763c6f4b1d35eadd2dd8cd236ade18a565439fbd515036881f890eaa5d2c3f73c8e467033f213a079b71221c14415926971fff1483bb14bb1634cdead77177909ba7869f8cc80f1e2277016f6fcce74b7144618f3e1a184dfeb9d3360a52c1a5deaf87e6709a29e718db8267d969ca7d4dbe9581128a70e40f2a74bb47d7d069c4c98a35bf0b7f428152a59c8ba23551f6b1ef1317b605f6cede76bcc87972ec38cd32beef6bd080932925faa1cc9c44218133c478c5bca216209f8ff9ecf4c47ada93823da09b8daec037a4e0b6af7f653c044112889b9dc73cc6858f7a21e32c82bd77bb9c82228af48a06be5e156215a9ff13b9a71fd998834e295784acf23b78adcd00048f443d349bb91f41c15b152435ee451be773a97562d7abbbca9807d6b93faa298fdc4b5ac0f4d9e968f687fc4567691ed8d6bfb8f5ddfbf348f89234cc1f852ef7eeca1379a76949375e76ff0dccf82163653cb8bd91dce9919e6b96426dcba50bf70314c538b8836594e8ba42ae0f77646d7d2ba4e40b913fbdb25772ea569684e4da1b5484df304dedf7e215ac7d485cfd53701553c0d60f02394e80d68dd8627fd0951f00febc3104e791ad6a11119a1a96dd3cc99dd1af85c539ed37c5c399a6eae8d6a16d0bcacc196dbce856bd4d6d9601d9f9a9b2fc76aac354b83f3bd141519ff0d2fcdcd8b7a7e2a4ea3b5f1124c29750b1691eabc9b0c69679aedf0af00fe58aa9362e6ede0af8db6de59ede19a95b77c09e09a3b529eb87012037d204dad3e2e04c3995e6f0bcae643c9520f39b21488dfd207dcb4364fe35c39b79b05c2bd57c0a81508398add3075868a5267bb121f24cb89fbd9ad64a1af2e30e913df9dc287ff59ef6e1fb53a3ce022d2b7011cf1264e7f73e794fbd71df497f0feeaf37b93554c7c6ddb17c06956b51ab1997f62c0656d0e9857e7192748c568f7464ef7510b81170469addcee0a6266129b3cb2953c0520fa46f781e043b08b2f629450633585efd445abaffc236b798c16fa41e893d758f9593937bf3d60fdeb03b9e659bdf14f32899e66c6e4532a01fd84cb95c7fc91174daa194561bdfa44de892027e0562cd5af49b1f4f6b811120af6584863af2e9a89e8b091e711c7ce9d10058774d7908e12e2c9989cbd5a941a159625a6e1cb279be2459f0bec7abe8252806dc029293754278a7dce3650233aa552cf0a7839c0c366ad30be7acd25b076a31341e03b4e1c0c48f36ea56b806a0d187e44a8da6cd9b3afddd5dde68764106a90bcdee7f2abeb72680a8203ec8d48d33bc7e5d6a0b99d0f1359d5a1bce834f6f753da557d8934b79c3d7e1933831f6cc6eb2467d1699089963fc9d2985eefc73acc9554ac9f71d878568a875de9b1d409763160144c7351196472b81a425e4735ec72b6d71ab4000b450d3634ec58f6f3baad14e31b9607444d0b513353ee94b758d84a0a32244b2a5e02666717ab22fe41d9b2807382c50e2d9126c0a0740c29050f70c476586e1c66beeb28eb3caaa1b73b413dc45d66bd56b0d37393284463f3315b4951ea86fa911e38a4348d6811577dc536a1bbc2786e7d374e7ce438b5b5f858e94d7a44071e9f1563dd2d8083ad7c32d9068d1f4c708ef218be9811db17a218e536bff6792fe417989cecef3d9899921e418f47ab1fa588c5aae4087b51d01e607de912969dab3d5dce0858c2814fb303e12ae3e5cd2692f9d146a76b1fdb928686a3cc69b81180d4b4501516b93f7ce8a8768ecc104788725165442a56f39e3c2b0cdda7ce7f23529aa51eaca3fa0b0ebe34db48d1ad047d82e4aa0274d2b17e90f78511a6b31eec700683d0bd78d39002b4048fdae931c8fc670e588331adf82c237fe979a61e3dbae15ca0005e08cafdad17ac7d63a9eee2d1966792066dcbdb2a244b1080b2d1f85ebd0c5f8449a9f36b2fe8b88b63172d55b549688452747f53b0b93080904145d42d9c65e393e2d1fe0b2c19e56db273e2b5f45b3d0b45bcd025bb0aca220d2e55bdb8bce2cab3c87c5f0266aaa299ea1c59b066c1d1e746cc0c16e270c9c26bfdb413f48a91e2c62b1ad0116bd1eed3721c99a2bc9dd00f2a1d518a39a7fc07e9c4eb13fa486c393680a1479f99e4e41fe0d1f4a13128d31adf984e133415ba24a10c0f2c9357d93b1f377d703b0c86919d7286f877944275d119c7eae1879ceeaa9627dca41a0e1a8dc4db794c7ddb3740506511257202da2d5b1962471b79d0718589e445f96b7d3ce35b32c1609c01174812b735237ffdb95cb9b3979547d9c55114a6ea8961e36f715661b306bf8c1615e4aa8f7bcd3f958eea1ef37bc25053f7221a04c6f74561dd4a574030b651fd32abd5a8093a401b72ea040e59ef1d836d309d7bcfa2238d7b6bde3db53572b9b1e9182c1b9d4f77f0209e4ed727532eb02d2bf872a308447b941abf45a6a3b26a0b4c73df5c0b32387026cfae1b54f6c916d596a45d2e768ee07d52669519c5dc8e2cdf7f2b30b0af855f3735d1d45c786a87bf72b71bc6ff3ed7d9defac3a0f2dc2e8c1141ecd2bde3bbcd0914df531ec23afb58be265a9e405ae4b2ce4459ca71ba632abddb8445d65b4d00cdf04efa8fe2f9cee890a73da2a1d49880befac7782721710649250b637f855b06baadba431dc6f3575b468a0abd301a79f2db3a23c5257b80e7f51525754d230c435cd38eb73b912fd1ce70781ce7efe3d0a8d728d01230ea762f", 0x1000) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r7, 0x40087703, 0x80000021802) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:17 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x500, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:17 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xc008ae05, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x2, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:17 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$SOUND_PCM_READ_RATE(0xffffffffffffffff, 0x80045002, &(0x7f0000000100)) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) r10 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r10, 0x8004551a, 0x0) fcntl$getflags(r10, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SG_GET_RESERVED_SIZE(r9, 0x2272, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000040)=0x80, 0x4) 13:43:17 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x29c01ccf11156735, r2) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x280002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x8102, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x6) lseek(r0, 0x4, 0x0) 13:43:17 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000000)) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:17 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = gettid() tkill(r6, 0x1004000000013) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(0x0, r8, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f0000000100)={0x8001, 0x1f, {r6}, {r8}, 0x8, 0x6}) ptrace$getsig(0x4202, 0x0, 0x40, &(0x7f0000000240)) r9 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) write$P9_RXATTRCREATE(r9, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) setsockopt$inet6_MCAST_JOIN_GROUP(r9, 0x29, 0x2a, &(0x7f0000000000)={0x20, {{0xa, 0x4e23, 0x1ff, @local, 0xd2da}}}, 0x88) sendmsg$tipc(r5, &(0x7f00000001c0)={&(0x7f0000000140)=@id={0x1e, 0x3, 0x0, {0x4e22, 0x4}}, 0x10, &(0x7f0000001680)=[{&(0x7f00000002c0)="4b767bf3b170427ba95ce41bf0b072677c90b56215cd697e6597ab73a32f1da0f00a395b85828d24a7886d1bcd436cfa8e5e660e7fa21cf1a15b26e5e1517df39807fe6ce88f67ee8f4a2f08bc2a13638a36ecb3cca84386859fb227bb13dd15d7f31a929c5044333a674607dd9612365ff90641f9af89199d772d6b9c79dde53639545759afd6c0a2d056ccbcb4636c113241fac55a3d18de7a28e2618a9527ce6fb9c445005cc64ba9", 0xaa}, {&(0x7f0000000380)="68bbe1fbfe844bc5be1d1b9799565a53cc298613749759483e2886c408c48ef8cfd35f87b706a2b43a3c1fdd275a5d02a9aebd689971456a5e8955664ae225042b36e51b3d9f1a7845a439afadbac84d2a677afbd16da2e8b443d09b233b0d41008fa7ef3ec59973bec125ae576f17c502b4679534d575838f8697402400deb3e9a770bdee79e2fb7c501466649d81fb887702885a47822cfae9e313c8f8dc4879491a1fecfb190adfe78a5920163a3839fec1ffc66205e4e5ca6c9647a1447801a4897a4fb619f6123efb279fb399a763090613bb175f", 0xd7}, {&(0x7f0000000480)="b83c9e0e72a8580cbdfb36b4d4b5f21e34bde6edb1048f93c44ec107495d852501272647b1f652a69c47e4cd3a14570254c071747264e71ffb3f18ced344d123dbebcdc59dc37ac006f80a541f55ba624a0f783bb3997eb5fc28e551711376ab700786ecb53248465339268851223d3e55653d9959ec6f887e134f65a93ac941e19b6b57aaf45e813fba57e76d239f01430758ae", 0x94}, {&(0x7f0000000540)="a17cad38a4ac7533c58e735eb82885164962af9928c44bdafbd0029d8269aa93f6ee5794ffa1f771fa2aeae2005905b81986145c4ee151bf1dc54994e6b9aa692395909be0ad8a4d5b90e73d3c06eaaba07a51b52878d34d642f0442bb457395a29493b3ab3b9b8437e58494ba81dd145d976479c99602230b36136384f0c4264ca5c4f9a29c641de0ae7fedefaadb17f21d", 0x92}, {&(0x7f0000000600)="d4f1a10caaa1d94d02c5d4687e8f62766a8b588a3dbb07785109771d7ef4455ac883ceeac15219386117a160f7404d62aece2b7a041b6545f867fdeac72f69e017cc508f8aeb30694e3fc86f15c2f3eace517f0389fe841f71c2a851847c979b2a6858e4d97af1c5aa761ee495b352b130ac4b26c5", 0x75}, {&(0x7f0000000680)="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", 0x1000}], 0x6}, 0x40810) 13:43:17 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xc0105512, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:17 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r1, &(0x7f0000000000)="2c0449bc0ce9aeefb9ee7837189461baddc2884df470d094d3cbfc6a9100c20a91fa297abc75716b49b418f138b2ec4967246c2c0aeb8a37caa01b0ad96c5942747f6669bbb71f35da063f5d098f4659a3f79ece1fbd909e0d2a0757745b385cb6752dd83388ab2329ad0242a108173c28a81247", 0x74, 0x801, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) ioperm(0x0, 0x200, 0x80000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @remote}}, 0x40000000, 0x4, 0x80000001, 0xfcb3, 0x2, 0x5, 0x80}, &(0x7f00000001c0)=0x9c) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VFIO_IOMMU_GET_INFO(r1, 0x3b70, &(0x7f00000000c0)={0x18, 0x0, 0x0, 0x1}) 13:43:19 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r0, 0x8004551a, 0x0) lseek(r0, 0x0, 0x0) 13:43:19 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') keyctl$set_reqkey_keyring(0xe, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_XRUN(r3, 0x4148, 0x0) 13:43:19 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xc0189436, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x3, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:19 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x24202, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r8, 0x8004551a, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x10000, 0x6, 0x4, 0x4, 0x3, {r3, r4/1000+10000}, {0x1, 0xc, 0x1f, 0x4, 0x9, 0x9, "3d8e3595"}, 0xa11b, 0x3, @fd=r7, 0x10001, 0x0, r8}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) r12 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r12, 0x8004551a, 0x0) ioctl$VIDIOC_QUERYBUF(r9, 0xc0585609, &(0x7f0000000240)={0x3ff, 0x4, 0x4, 0x1000000, 0xd117, {r10, r11/1000+10000}, {0x1, 0x2, 0x1f, 0x1, 0x8, 0x0, "bfa3c279"}, 0x81, 0x0, @userptr, 0x6, 0x0, r12}) r13 = fcntl$dupfd(r1, 0x0, r2) r14 = openat$cgroup_type(r13, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) flock(r14, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xc020660b, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x12f}]) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) io_pgetevents(r1, 0x675cbd7a, 0x3, &(0x7f0000000080)=[{}, {}, {}], &(0x7f0000000140)={r2, r3+10000000}, &(0x7f00000001c0)={&(0x7f0000000180)={[0x8]}, 0x8}) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r4, 0x0, 0x0) pwrite64(r4, &(0x7f0000000000)="ecc03017b07168ba8e9e1da32f9be1a8f7829275da45d411a2813cb1fb62fc01d5de55e23adae0a407b294c3a639ee7f03fed54122965e5e719ac71e09c7e4b561d2fc", 0x43, 0x7) 13:43:20 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$RTC_EPOCH_SET(r6, 0x4008700e, 0xffffffffffff0000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xc0306201, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:20 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCSMRRU(r3, 0x4004743b, &(0x7f0000000000)=0x2) lseek(r0, 0x0, 0x2) 13:43:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x4, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:20 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000240)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:20 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x480c02, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xed) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_TSC_KHZ(r3, 0xaea2, 0xff) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x60000, 0x0) ioctl$KIOCSOUND(r7, 0x4b2f, 0x100) 13:43:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0xc06864a2, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:20 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffffc, 0x4) 13:43:20 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x14304, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000240)="45db3d8b19c7a67044035ee8133dd8ac", 0x10) sendto$inet(r2, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r2, 0x1) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x1, '!'}, &(0x7f0000000000)=0x3e2) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) fallocate(r5, 0xb6661d405af061f4, 0x10, 0xfa) r6 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r6, 0x8004551a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f00000001c0)={0x0, 0x4, 0x9}) syncfs(r6) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) 13:43:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:20 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) openat$fb0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fb0\x00', 0x202, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r7, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000240)=ANY=[@ANYBLOB="6e0a00000000f239000009456c4700000500000001000008010000030000009000045ef839000000000000"]) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:21 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000240)={0x0, 0xb203, &(0x7f0000000400)={&(0x7f0000000100)={0x6c, r4, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast2, 0xdb}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x98, r4, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_SOCK={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x64}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x98}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8}]}]}]}, 0x98}, 0x1, 0x0, 0x0, 0xc040000}, 0x1056) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:21 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000040)={0xff, "36c28c04e17bcb37adc7e715581a96616b592a5e928377f4fd11a8470ea027e4", 0x2, 0x1}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x2000)=nil, 0x2000, 0x3000001, 0x810, r1, 0xc0a77000) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r1, 0x0, 0x2) 13:43:21 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x02\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') [ 2440.174499][ T983] tipc: Enabling of bearer rejected, failed to enable media 13:43:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x5, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:21 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r3, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\xab\x00\x00+\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xace\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\x03\x00\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x02\x05\xfe[H\xaf\x01\x1c\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\\x02\x00\x00\x00]\xaba\xe93\x01\xa23\xc9\x01\x00\x00\x00-\'\xd0\x9e}\x89\xff\x8c\xcb\xd71\x16\xa0D\b\x1d\xed\x11\x94k\x96Q\xbcX\xb9\xcb!\xbb\x84\xc2\xa1Z\x99\xf2Td\xbca?\x9f\x00\x00\x00\x00\x00\x00') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) recvmmsg(r4, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000300)) r5 = openat$mice(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/mice\x00', 0x101400) setsockopt$inet6_tcp_int(r5, 0x6, 0x10, &(0x7f00000002c0)=0x5, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f00000001c0)=0x80000001, 0x4) connect(r4, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @empty, 'veth1_vlan\x00'}}, 0x80) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x20) setsockopt$CAIFSO_REQ_PARAM(r6, 0x116, 0x80, &(0x7f0000000540)="585c8f87ff7863684c259fa4d7d0a286ae4ee1824189fe8da65d4fddb70baac1a5d3858d9be9027f0ce011ff7612945c83abe0cb395910b382c2e05e68d30d770db2701874a84bec6c0ffc8ba4cd1a7b9686c63206d688e258c94d", 0x5b) [ 2440.223392][ T995] tipc: Enabling of bearer rejected, failed to enable media 13:43:21 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r3, 0x8004551a, 0x0) r4 = socket$caif_stream(0x25, 0x1, 0x0) r5 = fcntl$dupfd(r2, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:21 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x7ff, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) r2 = socket(0x11, 0x800000003, 0x8) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x4028c2, 0x0) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000140)={0x2, 0x1, 0x12, 0x6, 0x193, &(0x7f0000000800)="a35f0d6c5b8f0ae39a78217829259ea3f96c2471ada217a0b5faeb9a3149f507832144f9da5ad87c166b69174b99bd8bd6de57259380ad855dfd4706f901449da338545ba04a18fa270eb957f5deeed9a55b1ebe178fc6af86b4dde6787d9f52928a60f3ead6dc60ec92c238cba78e8d40c86bd010225656d04af0f58c19e1e138bcb1ae89db0c1026e9734e8272f2babbf3fd4eda98ab111847da98b56895a27cd56560444d86f3a1bf61c479af3f97cfcbdbc2a4977570b464f1b3456d2c92bc91350f4e0140646a90771f6e2dbf4e581abab559348bdec7b8ae92fd5c5d0183825491cb35038992710ebb162135c818d22ad4a2e0d8557cf701fbb28398cea414da3753fdcdb1bdcffb118116f0ce8cb2febba285f70b4e2cfc2f8f995e798efaac7c7eb59e6957e786139953c963f87b921225fcc11c0c30f1daf470ff531b84ffb3311b40ba44618ee6991e621982142d483964774815e2600ef007a3410c336d8c172a24fac355784a38be6094fe1ec0f2f4d6443580e6f17a45470764a9b767bf16e443766a18708a38b6df304063f13f62c778389e6e5d181cd1ad1532089a6991a13f44adb07525f1b902522629cf0384bdd805ee3564e1bad897aaf0400d267717ecf72e0660da2f874b5e967fd2f46f354c84f7c7772b077c1b7d836d186a24bba8b3eec7353a3968de49460cb89d681ccf45f12c582a2e204763514831b31e2e4220e2f45e53c12dc82dc87099499515f059b6ce3ba57f18f3be9de4ed463beb5889c1cd3ce58b2da090cf1a743367ca13d4cbd4d0af99911728bf01089dee84646a1916eab27a02c915a3f07a19e30c23615507defd39bc1f0578908188d8434812c1365b8a338faa9dad30a41b2f2ecadaf4aff0aa932ec5e3b542179a4ccd525aa0e9fe3d1403d3de4201dcfb3fc36aa073b11e698b7d53836895be92897ac2a04757c652f60baa537151c6b2f95751c6f98a97eda3900c94dd871cbad9601ec497b16e30884865d7735b101d49ce6ebc411ffcedf31068831a472e5bcf7c45726d6b16f99df937d67180bcf302cfcdc0fbc95feaa2cf0a5b1eac6dfcebee10700552f1d2d96eb7172f2c0ad54b949ff784d4a7a4c0edbf84bffe80e74bd67a5ae92eedaad23f664bd9579a477ac7ca204270603a42e82e241224ac3f696b54a545d98fe7d1cf5930fbe9d5aa7ec7dae0611b119c3612d16d297d28cd17b0bee03050196014298aacb7764b240ed04e973ebd66ea23920838975aad23d0ce9821c17bc389fd5d92be5f48553c960ee95e8b92c3f2ad1356ee6342b40d167f7eae010197b887ee96d69896ddf7f601c3d782a866b65a9a4db686dededddc1d52151c71d5cfac04240ab39d7a11901e959eab892bb37890ad0f8fdb1a27028c44d8d4b1a934a4d241a9e60b86902247b4e4e1cb8432cb4a0f6a"}) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe7}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x183c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40]}, 0x45c) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) 13:43:21 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x03\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x6, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:21 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000000)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="b0000000", @ANYRES16=r2, @ANYBLOB="09040000000000000000010000001400020077673100000000000000000000000000800008807c00008024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff5400098028000080060001000a0000001400020000000000000000000000ffffe0000002050003000300ff0100000080060001000a00000014000200fe8800000000000000000000000000010500030000000000080005000100"], 0xb0}}, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10007}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x2000890) 13:43:21 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:21 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x04\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:22 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x05\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x7, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:22 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x5c, "837174bdd121d95a15d379949ed50844526799768acd618bd100558d8646ae3621ee4ca866e36aac86b6bc6442f33d7adcf46e4c5b264ddba72e6af4d07f4af6f452c979dea1ac2e48d4fa10afc4eb0a13d5ec5432ad8fe5ac5fda1b"}, &(0x7f0000000100)=0x64) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000240)={0x0, 0xb9c6, 0x1, 0xf8c2, 0x1, 0x3, 0x6, 0x1b4e7daa, {r7, @in={{0x2, 0x4e23, @multicast2}}, 0xffffffff, 0x7ff, 0x6, 0xcaa, 0x1}}, &(0x7f0000000140)=0xb0) r8 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r8, 0x8004551a, 0x0) fcntl$notify(r8, 0x402, 0x21) lseek(r0, 0x0, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$PIO_UNIMAPCLR(r11, 0x4b68, &(0x7f0000000040)={0xffc1, 0x6}) 13:43:22 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200200, 0x0) lseek(r0, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x200000c, 0x80010, r1, 0x66a31000) r2 = socket$isdn(0x22, 0x3, 0x26) fcntl$getflags(r2, 0x1) 13:43:22 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000000)={0x1, 0x2, 0x4, 0x4000, 0x9, {0x0, 0xea60}, {0x1, 0x2, 0x7f, 0x8, 0x0, 0x7, "ebb41286"}, 0x1, 0x3, @offset, 0x1, 0x0, 0xffffffffffffffff}) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:22 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x200000, 0x0) lseek(r0, 0x0, 0x0) 13:43:22 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x400600, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:22 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x06\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:22 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x80010, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SOUND_PCM_READ_BITS(r5, 0x80045005, &(0x7f0000000000)) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x0, 0x3) 13:43:22 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\a\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:22 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001002f70729b632f706172747c8d7e0fdee3e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029000000"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0x74, r2, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @private=0xa010101}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @local}, @NLBL_MGMT_A_DOMAIN={0x16, 0x1, './cgroup.net/syz1\x00'}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @rand_addr=0x64010102}]}, 0x74}, 0x1, 0x0, 0x0, 0x40081}, 0x4000000) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x601000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, r2, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @local}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1e}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private=0xa010100}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0xf7fc9858fe209383) lseek(r0, 0x0, 0x0) 13:43:22 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x54000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x7fffffff) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') ioctl$TCSETS(r1, 0x5402, &(0x7f00000001c0)={0x4ec, 0x9, 0x6, 0x7f, 0x17, "6b141f85e2f9cdfc9f3c7f76e2b1dfbd2be346"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPCONNDEL(r9, 0x400443c9, &(0x7f0000000040)={@fixed={[], 0x10}, 0x3ff}) r10 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$midi(r10, &(0x7f0000000240)="18ea049254c87c64fe58014ea101df394b88b3c0775a682aea4d0457094d854e841684ddd7c7d99c5e6d29dcff2546e45a0511f45b7519a40ca87e590898afad8ce39e24c1b8727907300dc279a7bb69df21c3b6da58d874df35af3501578a88dfc9550505ebaa91e3d47995c6c19ac7f7cabe2633b68e96870fbc4f07adac37244fea3d95b86fbc3b06bc1cf317296c216960605edc1fe811ac59d438cd851843ca547348aeec656223c38b6394ee122aa42cecf51935339f45c9e0642c33f5891746fa1d95d970f0053f4edece4e2e64e18d533cc1af14fed89879ab265b804f23b39075ca931ec9594ae4687915b5cb", 0xf1) 13:43:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x8, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:22 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:22 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) ioctl$BINDER_SET_MAX_THREADS(r3, 0x40046205, &(0x7f0000000000)=0x8) 13:43:22 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\b\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:23 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r6, 0xc0585609, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x100000, 0x4, {r7, r8/1000+10000}, {0x3, 0x1, 0x6, 0x9, 0xe1, 0x7, "91545ac5"}, 0x200, 0x3, @userptr, 0x4}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r12, 0x8004551a, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r11, 0xc0205648, &(0x7f0000000240)={0x3b0000, 0x4, 0x1ff, r12, 0x0, &(0x7f00000001c0)={0xa00905, 0x7, [], @p_u32=&(0x7f0000000140)=0x8}}) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x3ff) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000280)) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x2) 13:43:23 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) lseek(r0, 0x4, 0x0) 13:43:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x9, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:23 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, &(0x7f0000000000)) lseek(r0, 0x0, 0x2) 13:43:23 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x03\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:23 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2c, r5, 0x427, 0x0, 0x0, {0x4}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x44, r5, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x810}, 0x40) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:23 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2, 0x0) ioctl$UI_SET_PROPBIT(r7, 0x4004556e, 0x13) setresuid(0x0, r6, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(0x0, r9, 0x0) write$P9_RSTATu(r4, &(0x7f00000000c0)={0x7d, 0x7d, 0x2, {{0x0, 0x68, 0x200, 0xfffffffa, {0x2, 0x0, 0x7}, 0x20010000, 0x7ff, 0x1, 0x7fff, 0x29, '/sys/kernel/debug/binder/transaction_log\x00', 0x0, '', 0x8, '}.!<${+(', 0x4, ')%(('}, 0x0, '', r6, 0xffffffffffffffff, r9}}, 0x7d) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000080)={0x0, 0x0, 0x2, &(0x7f0000000040)=0xdb5f}) 13:43:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r3, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000001c0)={0x0, 0x1, '!'}, &(0x7f0000000000)=0x9) socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000000)={r4, 0x2, 0x3, 0x8, 0x2, 0xfff, 0x1, 0x9, {0x0, @in={{0x2, 0x4e24, @rand_addr=0x64010100}}, 0x4, 0x8, 0x1000, 0x401, 0x4}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000100)={r5, 0x200}, 0xc) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r6, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r6, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) lseek(r2, 0x1, 0x2) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000240)={0x1, 0xffffff01}) 13:43:23 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x2, 0x2) 13:43:23 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x05\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:23 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x480800, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0xa, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:23 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}}, 0x8080) r4 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r4, 0x10e, 0x2, &(0x7f00000002c0)=0x6, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r7, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r8, 0x300, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040814}, 0x24004855) 13:43:23 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x06\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:23 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x471d4ee4, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r2, 0x1) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000000c0)={r4, 0x1, '!'}, &(0x7f0000000000)=0x3e2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000080)={r4, @in={{0x2, 0x4e21, @remote}}, 0x1000, 0x1, 0x1, 0x1, 0x2, 0x3, 0x1f}, &(0x7f0000000140)=0x9c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PPPIOCATTCHAN(r10, 0x40047438, &(0x7f0000000000)=0x2) 13:43:23 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r3, 0x8004551a, 0x0) r4 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) fcntl$dupfd(r3, 0x0, r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r8, 0x8004551a, 0x0) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000600)) connect$l2tp6(r7, &(0x7f0000000180)={0xa, 0x0, 0x7a9f, @mcast1, 0x6}, 0x20) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer\x00', 0x120400, 0x0) ioctl$PPPIOCGCHAN(r9, 0x80047437, &(0x7f0000000580)) sendmsg$IPSET_CMD_HEADER(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c00000000060103000000000000000002f60000000000000000000005000100170000000900020073797a32000000000900020073797a31000000007f5874c4dddd06f9915b7eccd0e0be4a66bcc499f17058a614e8c4f7be747dde574bcc3d8a3f5be684eb0f32ecf4088db8daf5f46bbc61fc735b36df1128cca6217f945f9aa0eb827fd3fe24def5313349f1b99fa8ccefc64fdd42db5d5cb0bb17224ea03a82e9387b80e1b206d7d0115578b11c3267d9c619e168992344d69744bcaf2ca11acfefe6d43e30977725d1fa64829fc5d6f1", @ANYRESOCT=r2, @ANYRES64], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x480c4) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:23 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) 13:43:23 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$HIDIOCGRDESCSIZE(r3, 0x80044801, &(0x7f0000000000)) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:23 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x2b2b01, 0x0) lseek(r0, 0x0, 0x0) 13:43:24 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:24 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400240) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$fb(r6, &(0x7f0000000040)="1f5b480e587aba0ed414bfaa7445b3a4d10d", 0x12) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000000000)={0x48, 0x8ec}) 13:43:24 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\a\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r0, 0x8004551a, 0x0) ioctl$FIONCLEX(r0, 0x5450) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSBRK(r4, 0x5409, 0x6) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x204800, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lseek(r1, 0x0, 0x2) 13:43:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0xc, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:24 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={r6, @in6={{0xa, 0x4e24, 0x3, @private0, 0xec}}}, 0x84) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:24 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\xff\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:24 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x101000, 0x0) mq_getsetattr(r5, &(0x7f0000000080)={0x8001, 0x4, 0xfffffffffffffffb, 0x2}, &(0x7f00000000c0)) r6 = fcntl$dupfd(r3, 0x0, r4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000100)=0x81e00516c625bfae, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_G_CTRL(r6, 0xc008561b, &(0x7f0000000000)={0xc3, 0x100010}) r7 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0xe, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:24 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x40000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400300, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x20008024) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x3a9140, 0x0) ioctl$MON_IOCQ_URB_LEN(r5, 0x9201) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x53, 0x2) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept$inet6(r6, 0x0, &(0x7f00000000c0)) 13:43:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000100)={0x1, 0x0, 0x2, 0x2, {0xf96, 0x5, 0x6, 0xffff}}) r3 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7, 0x1, 'fq\x00'}, {0x4}}]}, 0x30}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x20008881) ioctl$USBDEVFS_IOCTL(r3, 0x8004551a, 0x0) pwrite64(r3, &(0x7f00000001c0)="534fa27366aa3016ab9de5d471898484d1f257569d2bee4b361991f2b1ff66f8", 0x20, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$evdev(r6, &(0x7f0000000240)=[{{r7, r8/1000+60000}, 0x1, 0x40, 0x7}, {{}, 0x15, 0x5, 0xa4}, {{}, 0x4, 0x7fff}, {{0x77359400}, 0x15, 0x7, 0xa77d8000}], 0x60) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r9, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={0x0, r10, 0x0, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r6, &(0x7f0000000040)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, r10, 0x1c, 0x0, @ib={0x1b, 0x7, 0x7, {"6d14655ac225e4e3c5fc87e949eb42c3"}, 0x504, 0x6, 0x1}}}, 0xa0) r11 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r11, 0x0, 0x0) 13:43:24 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:24 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x04\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:24 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$NFT_MSG_GETGEN(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x3680401}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x10, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x801) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000002c0)={0x0, 0x4, 0x80000001, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0xa10903, 0x3df, [], @p_u16=&(0x7f0000000240)=0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r10, 0xc058534b, &(0x7f0000000380)={0x4, 0x80000000, 0x401, 0x9, 0x0, 0xff}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r10, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000340)=0x10) ioctl$ASHMEM_GET_NAME(r9, 0x81007702, &(0x7f0000000000)=""/173) lseek(r0, 0x4, 0x0) 13:43:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x10, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:25 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) r0 = socket$bt_hidp(0x1f, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_tcp_int(r8, 0x6, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) renameat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', r3, &(0x7f00000001c0)='./file0\x00') r9 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$MON_IOCX_GETX(r9, 0x4018920a, &(0x7f0000000140)={&(0x7f0000000040), &(0x7f0000000240)=""/111, 0x6f}) write$capi20(r3, &(0x7f0000000000)={0x10, 0xe0, 0x2, 0x1, 0x0, 0x1000}, 0x10) lseek(r0, 0xa, 0x0) 13:43:25 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x420000, 0x0) lseek(r0, 0x0, 0x2) 13:43:25 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x28) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:25 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x05\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:25 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_G_JPEGCOMP(r6, 0x808c563d, &(0x7f0000000000)) 13:43:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x48, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:25 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$VIDIOC_G_OUTPUT(r4, 0x8004562e, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}]}, 0x30}, 0x1, 0x0, 0x0, 0x20044000}, 0x41805) 13:43:25 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) clone(0x8000000, &(0x7f0000000000)="903e49577d5fa4f1149dde731ea25903abcdf6276897213fbe778cab1f00e787c0d17377868fcd5e9c0512518292994eb7bb5ca553806b8bafad0581807b1604dbf0da7eccc16d9d9a36f02f8c9fade2ff77f91f16354afce67e7547809235901acba39ae951cea1b1caf7c1b9770303b71ca19850b8eae3f622625f7693d70b2f06d58b3d723937fd9b7bf21ae0fae2eb9d93bac9be652fe512be2db80de21000e7beef94b90132e7fc5112380cd2919276b02428f308f3ab348c774d9477c5e65b02899de5ecb2d49e2106313423a16336653b91f4c41c70d2a0b01ac4fbabe66c1896cee95e4a918ba6d5abb9b8b2", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000240)="fe7aad029dc3829361dda8e9e0682c1d36e07b52a918c348079acbc2bd833fb71d5c85b6ee24387211b26d0a45aef4c0f23c6725bcf9184032385b04cf670610b99034c0452303f2255fdad57281ebfbe673eee854eab313754c7b7ac757cc1d2eaf53d527a8295fbead87b7de2e99205d77d48f3d47aa534a1bfce05dc0123faab3e01bdf1ee2d1ab4190fd0a2e65afe9a5aed431f489b549d079f2b9205779f5ff1f5dd20eed9f00adcaa2590cf8e57a686e0d896073ad4db3d3be3172d33da57a08df95484fb4") ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="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", 0x111}], 0x4, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) lseek(r0, 0x0, 0x2) 13:43:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x82000, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r4, &(0x7f0000a34fff)='J', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f0000000140)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r4, 0x1) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f00000000c0)={r6, 0x1, '!'}, &(0x7f0000000000)=0x3e2) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000000c0)={r6, 0x800}, 0x8) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000000)={[{0x9, 0x7f, 0x4, 0x5, 0x20, 0xf7, 0x1f, 0x5, 0xff, 0x3f, 0x0, 0x3, 0xaaee}, {0x1f, 0x7, 0x8, 0x7, 0xfe, 0xa8, 0x80, 0x1, 0xb2, 0x0, 0xd5, 0xff, 0x9}, {0x1, 0x1, 0x6, 0x3f, 0x20, 0x6, 0x6, 0x4, 0xe6, 0x5, 0x7, 0xff}], 0xffffffff}) 13:43:25 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x06\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:25 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) io_uring_setup(0xd4f, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x372}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:25 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\b\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:25 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x10\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x4c, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:25 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x13\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:26 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADDIR(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="68000000290100010000008000000000060000000000000002000000000000000007002e2f66696c65300803000000000000000000000004000000000000000107002e2f66696c65300202000000040000000000000004000000000000000507002e2f66696c6530020287f7f0eceaf4cd1f7262f2deb0e542aa32"], 0x68) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r6, 0x8004551a, 0x0) ioctl$USBDEVFS_GETDRIVER(r6, 0x41045508, &(0x7f0000000240)={0x4a, "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"}) r7 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00@\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x60, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:28 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\xff\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:28 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x8000000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x68, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:28 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0xffffffdf, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) 13:43:28 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:28 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$rxrpc(r3, &(0x7f0000000000)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x800, @remote, 0x9}}, 0x24) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000040)='/dev/ashmem\x00') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') r4 = gettid() tkill(r4, 0x1004000000013) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r6, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r5, 0x0, 0x9, &(0x7f0000000080)='ip6_vti0\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r4, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)='\x00', r7}, 0x30) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000280)=r8) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:28 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x20000000, 0x80000001, {0x77359400}, {0x3, 0x1, 0x40, 0x4, 0x7f, 0x7f, "3f9c11b1"}, 0x510, 0x3, @userptr, 0x1, 0x0, r1}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setresuid(0x0, r4, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x0, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchown(r5, 0x0, r7) write$P9_RGETATTR(r2, &(0x7f0000000080)={0xa0, 0x19, 0x1, {0x1380, {0x1, 0x4, 0x5}, 0x63, r4, r7, 0xfffffffffffffff7, 0x18, 0x5, 0x3ff, 0x1, 0x7, 0x5, 0x401, 0x400, 0x0, 0xffffffffffffffb5, 0x10000, 0x6, 0xffffffffffffffff, 0x9}}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:28 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$can_j1939(0x1d, 0x2, 0x7) fsetxattr$security_evm(r3, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@ng={0x4, 0xd, "fd00648e7af8448c703c"}, 0xc, 0x0) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_pts(r8, 0x90200) lseek(r9, 0x0, 0x2) 13:43:28 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x02\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:28 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) prctl$PR_SET_FP_MODE(0x2d, 0x2) write$P9_RVERSION(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="1300000065ffff6a8fad15891df7e5b465b088"], 0x13) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) lseek(r0, 0x4, 0x0) 13:43:28 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x15) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="ffff"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x184, r4, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x4}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}]}, 0x184}}, 0x5) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r5, 0x0, 0x0) 13:43:29 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x03\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x6c, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:29 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='&\\@\x13*\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:29 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000080)=0x9) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x131080) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000701000/0x4000)=nil, 0x4000, 0x200000f, r4) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:29 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) lseek(r0, 0x0, 0x0) 13:43:29 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x04\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:31 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x0) 13:43:31 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r0, 0x8004551a, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) lseek(r1, 0x4000, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x11) 13:43:31 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x05\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:31 executing program 5: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x800) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r4, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lseek(r4, 0x0, 0x2) 13:43:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSIG(r2, 0x40045436, 0x8) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) ioctl$ASHMEM_SET_NAME(r3, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') fcntl$dupfd(r3, 0x0, r3) ioctl$ASHMEM_SET_NAME(r3, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x74, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:31 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x06\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:31 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x6, 0x119040) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x40, r2, 0x200, 0x70bd27, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_SEQ={0xa, 0xa, "97d6ebca5566"}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "265736579ef2c7a688f1032910"}]}, 0x40}}, 0x4000084) lseek(r0, 0x1000000063, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGDEV(r5, 0x80045432, &(0x7f0000000000)) 13:43:31 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000000)={0x2, 0x1, 0x9, 0x16, 0xf2, &(0x7f0000000540)="c2df08f6bba8c35f1653515d9fb2b7a1b2ed7f4fb4c24dafe821d39594dad6c1ae50fb7112e8c890f7cda846a330abb794868d8be44af343572759d4a80a12ca88793a38318e4cbe627a9d55b2b567844fee6041f878ae95f33bb7c8ce4645e3c205872baf715b4f4c3b143eea9d64696982ed33a7b57ff79b156e7ed091222beb587729b57ba8ec1b927aac5d86294ce28525726772f27c2831bb96c9193eff2532d6df06ea4ba7417b9b4f6507b817dc02c50af54d8b9ecf2c6fabb2ec2c853a69a38c0531ca9291e17a5360deb1b6f20a1d7f8de811e5ed65ae8f61f99c845ac86964568609f3a819a758164dd8e0f0bd0662a522a0db47a957606987c2c0d453773e27544a26d683adf17c4bd5ddf317904ab8875f043ecfb7b1db6256f5871e9ba688c2f9b84eeb133d83d4e425470d644e73ac68b29ed9fa7b9d37b1f6b6e53cbfe32dc014fdbed4c0a17c7b409dc23a344ee48db4b99dec8098b4f9c94066dbc69197381b3a01b50a2af21418fc71d1af890d13266b32188d6819fa78a4145b48d4b9891586e2e751e332e0e1bfb2b59f93907e49827e350b96a3de7b399add8fc039031561bde3c36ee6fd0d1e7c8354bfe55fa874f8d5f5ebe29d14395b27a229318f5126e92020ddc62d0d326529ef6bb287846f25f074bb1f6f1af43c819fdec99683f4d3f639390d6715bcdc7320d4e1a589b2c5b9ce41cfec7cee63e4c779181bf436970c60d193fd270f4607658eab5e7137250b41be94397512257e28008d37ee4998d3ea75edbceddbfedb4a629a4c38f526166d84e04a97d7375d0140d41bd437a000055062cc7430ec1ef7423dfbfeec054768bc0dfe3e20a6b8f5dc1144a3070bfb8c334f56abb7c0b59089de46213c0e9749e501b3c268f7e3e398529e0af41378bbbe13d08fff329f4093c8fde03cdfb7905bf5fd685bfaeae72ddf4fe0c320d4e8c1fd272e699adcd6086ecff7501886b209b3c9bf13a5a833c51a34ace38836c0934f4c0697268ecf58a8282a669568f0b200f21865aa8fde6b149fa216ead14dfae46b51a01aaee912d046bfb4b069c053780d8d4793bb790b1f89e6054e141fd5f9e6c97fb46dd91404b7eb20a642bf4dfd183891b2d20d97593ef053b1796c1f6f4b2c8030a50b1111722554f72834e4117217b5456231d06c8ef5519d7f2cbb5dc13a55de9a0323e0af627d8f01698c1323a0c8a82a464c8c64d28199f7c3b491eaf155b0f0707c3c168273bfbcd7ee8945ddca52673e528297950c504c1a1eca26fbcfcd46568f00043ce4ee8f15f36f0a86743cf1826d54ddfa9e11a0580cd7359b2a952e39ccba94097eafa16c9cbac6689445606d6e41890af90523b1a41dccc630e4543240d940a0defb169fda8dc8f11af36f6389e1beaf0d4ee64b2293e1b1cb1b49226fe95e22214cf567f0d960a5"}) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:31 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r4, 0xc0585609, &(0x7f0000000040)={0x3, 0x7, 0x4, 0x40000, 0x563, {r5, r6/1000+60000}, {0x3, 0x1, 0x5, 0xa7, 0x9, 0x2, "4d035a34"}, 0x3f, 0x1, @offset=0x9, 0xa792, 0x0, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r7, 0x84, 0x79, &(0x7f00000000c0)={0x0, 0x7fff, 0x3f}, 0x8) socket$inet_mptcp(0x2, 0x1, 0x106) r8 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r8, 0x8004551a, 0x0) r9 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r9, 0x8004551a, 0x0) r10 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r10, 0x8004551a, 0x0) r11 = fcntl$dupfd(r10, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:32 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\a\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x7a, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:32 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x5) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:32 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000180)=@ng={0x4, 0x13, "fddeda44ff01720e1f24a756970aa455ded440"}, 0x15, 0x3) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$inet(r3, &(0x7f00000001c0), &(0x7f0000000240)=0x10) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:32 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\b\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:32 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x1, &(0x7f0000000000)=0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x5, 0x121100) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) io_cancel(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x81, r5, &(0x7f0000000040)="999b7183852d98a13171bb8bad1d3fde2825846623ebc00b5d6e3997e7a819c47f60fc7e9c77b663ae1e8c31d0a8ce0e08df200729ede78b55e2c900cab8d68891ab8773f65fcd26d6fa970328aa3f650af73f58aa7b48bb2ff9d6f459dc24822bbb712b72795a15ebbf189064ef9a1ea08e46892de4e80f8dd1b6fe6fbef7d5dcda8ede51d1b11798871fbc03b93a5bba", 0x91, 0x9, 0x0, 0x2, r8}, &(0x7f0000000140)) lseek(r0, 0x4, 0x0) r9 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r9, 0x8004551a, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000280)={0x0, 0xee5, 0x9, r9, 0x0, &(0x7f0000000240)={0x980001, 0x1ff, [], @p_u8=&(0x7f00000001c0)=0x20}}) getsockopt$IP_SET_OP_GET_BYINDEX(r10, 0x1, 0x53, &(0x7f00000002c0)={0x7, 0x7, 0x2}, &(0x7f0000000300)=0x28) r11 = gettid() tkill(0x0, 0x1004000000013) ptrace$setsig(0x4203, r11, 0x3f, &(0x7f00000003c0)={0x40, 0x3, 0x8}) 13:43:32 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x03\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:32 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_INFO_BUFS(r3, 0xc0106418, &(0x7f0000000000)={0x93e, 0xffff, 0x3, 0x11a, 0x1, 0x7}) lseek(r0, 0x0, 0x2) 13:43:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0xf0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:32 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r1, 0x84, 0xc, &(0x7f00000000c0)=""/4086, &(0x7f0000001140)=0xff6) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2000002, 0x4000000032, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$KVM_S390_INTERRUPT_CPU(r4, 0x4010ae94, &(0x7f00000000c0)={0x4, 0x40, 0xfffffffffffffffc}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x29, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r6) accept4$unix(r5, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) 13:43:32 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x05\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:32 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$HIDIOCGVERSION(r3, 0x80044801, &(0x7f0000000000)) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:32 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)={0x14, r5, 0x522f58c7ff5ac33d}, 0x14}}, 0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r5, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x3b}}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x40005) 13:43:32 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x06\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:32 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000080)={0x0, 0xb1, 0x5, r1, 0x0, &(0x7f0000000040)={0xa10904, 0xc5e, [], @p_u16=&(0x7f0000000000)=0x2}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x8402, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x4) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$KVM_S390_VCPU_FAULT(r5, 0x4008ae52, &(0x7f0000000340)=0x9) sendmsg$NL80211_CMD_NEW_KEY(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="000229bd6800fddbdf250b0000000800090001ac0f00352655a37233ad819183bb2153a2321b339d6fca514ed48f2a2f5deea1c382d59cfe8a63942e3c7d76ade58d6420adc41572f3577b0e98854bdb0514d936dc56aca867cc7ab2ab5dcbd539353373600ccd9d613d8de5120dcfb7d094da2cab6715ab72b44030ce0c0c3a7c9e48a283c05858dfd23a8a8b0b6cc9ae99741419da"], 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) 13:43:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x300, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:32 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000040)={0x0, 0xfff, 0x81, &(0x7f0000000000)=0x3}) write$binfmt_elf32(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/2691], 0xa83) 13:43:33 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x1000008, 0x50, 0xffffffffffffffff, 0xfa6c000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = semget$private(0x0, 0x0, 0x0) semctl$GETNCNT(r4, 0x0, 0x10, 0x0) semctl$GETNCNT(r4, 0x3, 0xe, 0x0) semctl$GETVAL(r4, 0x2, 0xc, &(0x7f0000000280)=""/140) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000540)={0x2, 0x4}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000340)=0x4, 0x4) r5 = gettid() tkill(r5, 0x1004000000013) r6 = perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x4, 0x7, 0x2, 0x54, 0x0, 0x5, 0xa8030, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x10000, 0x9, 0x1f, 0x1, 0xfffffffffffffffb, 0x4, 0xff}, r5, 0x0, 0xffffffffffffffff, 0x2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x254903, 0x0) readahead(r6, 0x1, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:33 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\a\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:33 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSKBENT(r3, 0x4b47, &(0x7f0000000000)={0x2, 0x40, 0x7}) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000040)=0xfc) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r5, 0x40106614, &(0x7f00000000c0)) lseek(r0, 0x4, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r7, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r7, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 13:43:33 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) rt_sigreturn() mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r5, 0xc05c5340, &(0x7f0000000000)={0x7, 0x3ff, 0x10000, {0x6, 0x6}, 0x8, 0x4}) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:33 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\xff\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:33 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x0, 0x0) semctl$GETNCNT(r1, 0x0, 0x10, 0x0) semctl$GETNCNT(r1, 0x3, 0xe, 0x0) semctl$GETNCNT(r1, 0x2, 0xe, &(0x7f0000000000)=""/221) lseek(r0, 0x0, 0x0) 13:43:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x500, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:33 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x90600, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(0xffffffffffffffff) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) dup(r1) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000003c0)) r5 = openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xe8, r6, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x40}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x5e}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x6c}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4004080}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) accept4$inet(r9, 0x0, &(0x7f0000000340), 0xe00ea7092816051b) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="5f0cbf9de4a66d74f1788ac6defe4330ad9850f167f8c2c2f3f2a85e17f35873d141005797c73862d71176d339e09473b48f208c43780add9c12fb44769a2fc6ea6ec9a3148f34c1c3d26530b9f60b67379c80ee867dede8b793ca9b93f7a8e232e006904fbb4b1c9084e38ec65d14cfec2bda47b87e547da54ac3f34485b0b9f7059106cc5cd5f233060753d923851e8d6e941b5051e343d7d8c30849607fe26fca1a7b91282649d24e9fb44a9cc2cac78a7e74def5ed3f173cff0f83", @ANYRES16=r6, @ANYBLOB="000128bd7000ffdbdf25090000002400028006000e004e23000008000400ffffff7f06000b000a0000000800030004000000080005008f000000"], 0x40}, 0x1, 0x0, 0x0, 0x4010}, 0xc004) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'raw\x00'}, &(0x7f0000000480)=0x54) lseek(r10, 0x0, 0x0) 13:43:33 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x02\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:33 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_create1(0x0) lseek(r0, 0x0, 0x2) 13:43:33 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 13:43:36 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000580), &(0x7f00000005c0)=0xc) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x20100, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r4, 0x4040ae70, &(0x7f0000000540)={0x7ff, 0x1c, 0x20, 0x100}) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x8001) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r7, 0x40087708, &(0x7f0000000000)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xba\xde\'\xce\x1a\x8d}\x8b\xa1++B\r4\x81\xdf,\xffW\x1a<\xa9\xb9_H{\xba\x9f\xbf\x91\xc6\x80}.\x02\\<\x13\x96q>\x85\f\aU-)\x99G\x8c\x0e\xc0C\xedm\xafSt\x14\xbd$\xa9\xd3fMZ\x03n\x8b\x18\x04\xff\xb1LNNhw\x87\xe8k\xcd\x17\xfa@.K\xa9\"\xb4P\xb8K\x13\v\xf0,\xdb\x93\xd8\xae\xb6L\x01E\x04\xd3\xd3\xaan/\xed|\xb6\r\x8cZ\b\x8a\x81\xb8\x0e\xbc\xa7\xe4\x1e\x8ag\xa1B\xde\xf3(\xe8\xa3\x80FnY\xfd%\xe5X\x80\xfax') r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$VIDIOC_RESERVED(r7, 0x5601, 0x0) setsockopt$inet_group_source_req(r8, 0x0, 0x2b, &(0x7f0000000240)={0xb8800000, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e21, @loopback}}}, 0x108) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 13:43:36 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x03\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:36 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x600, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:36 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = open(&(0x7f0000000040)='./file0\x00', 0x180, 0x34) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f0000000000)) socket$l2tp6(0xa, 0x2, 0x73) 13:43:36 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x04\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:36 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_EDID(r3, 0xc0285629, &(0x7f0000000100)={0x0, 0x6, 0x0, [], &(0x7f00000000c0)=0xc0}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000000)={{0x5, 0x3}, 'port0\x00', 0x20, 0x800, 0x2, 0x16, 0x2, 0x4, 0x7, 0x0, 0x4, 0xa9}) lseek(r0, 0x0, 0x0) 13:43:36 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x100000000000085) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000000100)={"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"}) ioctl$KVM_RUN(r5, 0xae80, 0x0) dup3(r1, r2, 0x0) ioctl$KVM_SET_CPUID(r5, 0x4008ae8a, &(0x7f0000000500)={0x1, 0xa0008000, [{}]}) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:36 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = socket(0x5, 0x800, 0x2) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchown(0xffffffffffffffff, 0x0, r8) write$FUSE_DIRENTPLUS(r7, &(0x7f00000002c0)=ANY=[@ANYBLOB="5803000000000000070000000000000001000000000000000100000000000000ffff000000000000f9ffffffffffffff0008000001800000010000000000000006000000000000000000000001000000040000000000000001040000000000000700000000000000cffbffff0800000008000000090000007f000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000aa00000000000000050000000000000006000000000000000c000000080000002f6451762f6173686d656d0000004e6027a868376026000001000000000000000300000000000000010000000000000003000000000000000900000004000000020000000000000000800000000000000300000000000000ff0000000000000017000000000000000500000000000000030000000a000000eb5b0000008000000500000004e4b39723c2819c17e58b1a4778da0188dc4f3ae4066b036c7460dedeb9434176b406c5856d2eb33c8c68dc73238b79428f1bb624a7458dcb8a8667c773b2d048337b26ce2d53db046d486ee74f1006084882d20dcfcb3d28c255fb7b052438d6286015af96d05dc988b0fbe50a", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="040000007f000000000000000600000000000000080000000000000015000000020000002f6465762f6275732f7573622f3030232f303023000000000100000000000000000000000000000009000000000000005804000000000000810000008b0b00000100000000000000ff7f000000000000050000000000000008580000000000003a00000000000000da090000000000001f000000a1280000010000000900000001000080", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="af000000d200000000000000040000000000000057000000000000000c00000000f87f002f6465762f6173686d656d00000000000200000000000000000000000000000001000000ffffffff07000000000000000700000000008002060000000000000076000000000000000900000000000000ff070000000000000900000000000000e1ffffffffffffff86000000000800000800000000100000a0550000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01000000a0000000000000000300000000000000000000000000000006000000000000005e5e21aee0400000040000000000000000000000000000000700000000000000035ceb27000000007f0000000900000002000000000000000800000000000000090000000000000002000000000000006106000000000000f5000000000000003f0000000600000004000000ae00000001040000", @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="000001000100000000000000000000000200000004000000000000000c0000f8ff0b00002f6465762f6173686d656d0000000000ca49dc5bfef7e2e249a011e32d8b"], 0x358) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f00000000c0)=0x7) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f0000000100)={0xa00000, 0xb93, 0x5, r0, 0x0, &(0x7f0000000080)={0xa00965, 0xa, [], @value64=0x5}}) getsockopt$XDP_MMAP_OFFSETS(r9, 0x11b, 0x1, &(0x7f0000000240), &(0x7f0000000140)=0x80) r10 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:36 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_SIGNAL_MSI(r6, 0x4020aea5, &(0x7f0000000180)={0x1000, 0x4000, 0x23, 0x7f, 0x7f}) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') mmap(&(0x7f0000702000/0x1000)=nil, 0x1000, 0x1000008, 0x1010, 0xffffffffffffffff, 0xc0360000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VFIO_IOMMU_GET_INFO(r9, 0x3b70, &(0x7f00000001c0)={0x18, 0x0, 0x0, 0x101}) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:36 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x05\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:36 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x28a41) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x1, 0x4, 0x8}}, 0x14) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x61f, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) [ 2455.602918][ T2616] kvm: vcpu 133: requested lapic timer restore with starting count register 0x390=4241646265 (4241646265 ns) > initial count (296265111 ns). Using initial count to start timer. 13:43:36 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x06\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:36 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r0, 0x8004551a, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) lseek(r1, 0x2, 0x4) 13:43:36 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x12042, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x4000)=nil, 0x4000, 0x2, 0x13, r0, 0x3834e000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x802, 0x0) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f00000001c0)=0x36) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_CALL(r4, 0x4008af21, &(0x7f0000000200)={0x3, r1}) r5 = ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r5, 0x40106614, &(0x7f0000000000)) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:37 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r6, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r7, 0x10, 0x0, @ib={0x1b, 0x2, 0x8, {"73322c66aa55d98b3bb0101e7ce9baa1"}, 0x7ff, 0x4, 0x100000001}}}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x1, 0x8, 0x4, 0x80}, {0x1f, 0xf8}, {0x1, 0x8, 0x5, 0x6}, {0x6, 0x4, 0x81, 0x3}, {0x1f, 0x5, 0x4, 0x6}]}) 13:43:37 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\a\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:37 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0xa, 0x40010, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip6erspan0\x00', 0x10) lseek(r0, 0x4, 0x0) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x404040, 0x0) epoll_pwait(r3, &(0x7f0000000080), 0x0, 0x10001, &(0x7f00000000c0)={[0xfff]}, 0x8) ioctl$ASHMEM_SET_NAME(r5, 0x41007701, &(0x7f0000000040)='\x00') 13:43:37 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000000)) lseek(r0, 0x0, 0x0) 13:43:37 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000980)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8983, &(0x7f00000009c0)={0x8, 'ipvlan0\x00', {'macvlan1\x00'}, 0x9}) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x1d5a00) ioctl$KDDISABIO(r2, 0x4b37) setsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000040), 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200800, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0xc) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000540)={0x18, "4d6e13ab968ecd13a4d2874673ee38117ce09be0146937eea517429e0952ddc429ae8ed6d785ed54bd57f26165679fbda4565886cfca6b4ff9836bcc856cec99f65701b966532cf1f014972290da96fcb62b4805035e3eaddb891892d71761602def73363fa298ce5cbc128fc740f1e42b9acbbb6d640f463470261d198f1c6c98f57e213e2749cc3f09b0b1dd0bb85dc1bf8ea9256b0bf6dc8e605d13e3128d58245b786eec6d5aaa4e8fff6b482d511c72c0237c7781684655686ea7bd7f1e4dc2e01491858284a9bec9ce6761e396838b4560856a4cb00aec4a95913360ef96b7d7d8f7b9ff554320d6bcd9919904b5dc578e9449da48fc11b77315d689bfd89ed519b382e615dcbc98013d8712eb73b013bb295ded8109e9506e6bd0f0fc468a42573d5eebc026251065c8161a6ebc6ee51c955383917069db90ad813934793956361cef2371f1dd57efa9014e2482b9964674fc2f8e9a03d818a26c47d9b548a09f75b275b5242e6f67ff6d69d6bbc572329d2488bb1d8813be5803b02863d50c751d06a506f51256665d699ec48a9f4e46dbd4d7e10b0ab10189f8c288a2fd0967dbf288c5965916ae18ea8a2bba2d81fd31ce9ef875c41dc258aefbfe1bc1900ca083b65705a247f9eeca8f1e49b13d8d892dee6fd78dfb9cddc0a5b3f08d62890faf6cd76cf8e16d9be3b325aafa17bb2930b31d0715d7e93059fea4"}) ioctl$KVM_GET_PIT2(r3, 0x8070ae9f, &(0x7f0000000240)) r5 = gettid() tkill(r5, 0x1004000000013) r6 = syz_open_procfs(r5, &(0x7f00000001c0)='net\x00') ioctl$TIOCGSOFTCAR(r6, 0x5419, &(0x7f00000002c0)) 13:43:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x700, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:37 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r5, 0x800442d3, &(0x7f0000000000)={0x40, 0x0, 0x9, @remote, 'geneve0\x00'}) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:37 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\b\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:37 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) recvmmsg(r1, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10002, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) lseek(r0, 0x0, 0x0) 13:43:37 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000702000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000100)={0x1, [0x0]}) ioctl$VIDIOC_PREPARE_BUF(r6, 0xc058565d, &(0x7f0000000000)={0x8, 0x1, 0x4, 0x4050e020, 0x4, {}, {0x1, 0xc, 0x1, 0x40, 0x0, 0x4, "44aa09ee"}, 0x4, 0x1, @offset=0x9, 0x3, 0x0, 0xffffffffffffffff}) ioctl$KDMKTONE(r7, 0x4b30, 0xfffffffffffffc01) r8 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r8, 0x8004551a, 0x0) r9 = fcntl$dupfd(r8, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) read$char_usb(r9, &(0x7f0000000240)=""/4096, 0x1000) r10 = fcntl$dupfd(r1, 0x0, r2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r9, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) 13:43:37 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) r3 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r3, 0x0) r4 = add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r4, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r3, r4}, &(0x7f0000000140), 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={'crct10dif-generic\x00'}, &(0x7f0000000240)="7713277d18f2cb954b867a824a9d7e55906a62c445d0b3b5ccd37ee7e839462c38761110aad6b2b3bde3f0abb40766ebfaac861cb3a4de19a8d7332a2ea7040788c93e3ebaa0205eccd9df5b4f8f5d54237570d6f7fba1a61b125aeb7e", 0x5d}) ioctl$USBDEVFS_IOCTL(r2, 0x8004551a, 0x0) r5 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x410100, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r6}, 0x10) lseek(r0, 0x0, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f00000000c0)=0x4) 13:43:37 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x900, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:37 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000000)={0x8000, 0xb8c, 0x1}) 13:43:37 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x05\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:37 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f0000000000)={0x6, 'team0\x00', {0x3}, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) prctl$PR_SET_DUMPABLE(0x4, 0x1) pwrite64(r1, &(0x7f0000000000), 0x0, 0x1f) [ 2457.464955][ T1670] [ 2457.467308][ T1670] ====================================================== [ 2457.474314][ T1670] WARNING: possible circular locking dependency detected [ 2457.481323][ T1670] 5.7.0-syzkaller #0 Not tainted [ 2457.486391][ T1670] ------------------------------------------------------ [ 2457.493409][ T1670] kswapd0/1670 is trying to acquire lock: [ 2457.499111][ T1670] ffff88809340d970 (&sb->s_type->i_mutex_key#16){+.+.}-{3:3}, at: shmem_fallocate+0x153/0xd40 [ 2457.509354][ T1670] [ 2457.509354][ T1670] but task is already holding lock: [ 2457.516707][ T1670] ffffffff89a68aa0 (fs_reclaim){+.+.}-{0:0}, at: __fs_reclaim_acquire+0x0/0x30 [ 2457.525644][ T1670] [ 2457.525644][ T1670] which lock already depends on the new lock. [ 2457.525644][ T1670] [ 2457.536033][ T1670] [ 2457.536033][ T1670] the existing dependency chain (in reverse order) is: [ 2457.545036][ T1670] [ 2457.545036][ T1670] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 2457.552243][ T1670] fs_reclaim_acquire.part.0+0x20/0x30 [ 2457.558215][ T1670] __alloc_pages_nodemask+0x4da/0x810 [ 2457.564104][ T1670] alloc_pages_vma+0xd9/0x600 [ 2457.569293][ T1670] shmem_alloc_page+0xb0/0x170 [ 2457.574570][ T1670] shmem_alloc_and_acct_page+0x160/0x980 [ 2457.580714][ T1670] shmem_getpage_gfp+0x514/0x24f0 [ 2457.586255][ T1670] shmem_write_begin+0x102/0x1e0 [ 2457.591766][ T1670] generic_perform_write+0x20a/0x4e0 [ 2457.597565][ T1670] __generic_file_write_iter+0x24c/0x610 [ 2457.603708][ T1670] generic_file_write_iter+0x3f3/0x630 [ 2457.609678][ T1670] new_sync_write+0x426/0x650 [ 2457.614864][ T1670] __vfs_write+0xc9/0x100 [ 2457.619700][ T1670] vfs_write+0x268/0x5d0 [ 2457.624538][ T1670] ksys_write+0x12d/0x250 [ 2457.630976][ T1670] do_syscall_64+0xf6/0x7d0 [ 2457.635999][ T1670] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 2457.642395][ T1670] [ 2457.642395][ T1670] -> #0 (&sb->s_type->i_mutex_key#16){+.+.}-{3:3}: [ 2457.651097][ T1670] __lock_acquire+0x2a9a/0x48a0 [ 2457.656482][ T1670] lock_acquire+0x1f2/0x8f0 [ 2457.661499][ T1670] down_write+0x8d/0x150 [ 2457.666258][ T1670] shmem_fallocate+0x153/0xd40 [ 2457.671636][ T1670] ashmem_shrink_scan+0x34d/0x500 [ 2457.677179][ T1670] do_shrink_slab+0x3fa/0xa30 [ 2457.682369][ T1670] shrink_slab+0x16f/0x5f0 [ 2457.687297][ T1670] shrink_node+0x53e/0x1c00 [ 2457.692315][ T1670] balance_pgdat+0x753/0x1110 [ 2457.697504][ T1670] kswapd+0x5d0/0xe80 [ 2457.701997][ T1670] kthread+0x388/0x470 [ 2457.706586][ T1670] ret_from_fork+0x24/0x30 [ 2457.711500][ T1670] [ 2457.711500][ T1670] other info that might help us debug this: [ 2457.711500][ T1670] [ 2457.721719][ T1670] Possible unsafe locking scenario: [ 2457.721719][ T1670] [ 2457.729159][ T1670] CPU0 CPU1 [ 2457.734510][ T1670] ---- ---- [ 2457.739860][ T1670] lock(fs_reclaim); [ 2457.743852][ T1670] lock(&sb->s_type->i_mutex_key#16); [ 2457.751816][ T1670] lock(fs_reclaim); [ 2457.758302][ T1670] lock(&sb->s_type->i_mutex_key#16); [ 2457.763746][ T1670] [ 2457.763746][ T1670] *** DEADLOCK *** [ 2457.763746][ T1670] [ 2457.771879][ T1670] 2 locks held by kswapd0/1670: [ 2457.776711][ T1670] #0: ffffffff89a68aa0 (fs_reclaim){+.+.}-{0:0}, at: __fs_reclaim_acquire+0x0/0x30 [ 2457.786175][ T1670] #1: ffffffff89a43450 (shrinker_rwsem){++++}-{3:3}, at: shrink_slab+0xc7/0x5f0 [ 2457.795283][ T1670] [ 2457.795283][ T1670] stack backtrace: [ 2457.801174][ T1670] CPU: 1 PID: 1670 Comm: kswapd0 Not tainted 5.7.0-syzkaller #0 [ 2457.808791][ T1670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2457.818833][ T1670] Call Trace: [ 2457.823709][ T1670] dump_stack+0x188/0x20d [ 2457.828038][ T1670] check_noncircular+0x32e/0x3e0 [ 2457.832974][ T1670] ? stack_trace_save+0x8c/0xc0 [ 2457.837820][ T1670] ? print_circular_bug.isra.0+0x3a0/0x3a0 [ 2457.843617][ T1670] ? mark_lock+0x11f/0xdd0 [ 2457.848025][ T1670] ? save_trace+0x42/0xaf0 [ 2457.852439][ T1670] ? find_first_zero_bit+0x94/0xb0 [ 2457.857570][ T1670] __lock_acquire+0x2a9a/0x48a0 [ 2457.862419][ T1670] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 2457.868388][ T1670] ? print_usage_bug+0x240/0x240 [ 2457.873335][ T1670] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 2457.879306][ T1670] ? page_referenced+0x12f/0x520 [ 2457.884237][ T1670] lock_acquire+0x1f2/0x8f0 [ 2457.888734][ T1670] ? shmem_fallocate+0x153/0xd40 [ 2457.893669][ T1670] ? lock_release+0x800/0x800 [ 2457.898336][ T1670] ? mark_lock+0x11f/0xdd0 [ 2457.902748][ T1670] down_write+0x8d/0x150 [ 2457.907705][ T1670] ? shmem_fallocate+0x153/0xd40 [ 2457.912636][ T1670] ? __down_timeout+0x2d0/0x2d0 [ 2457.917475][ T1670] ? __lock_acquire+0xc6c/0x48a0 [ 2457.922404][ T1670] shmem_fallocate+0x153/0xd40 [ 2457.927163][ T1670] ? __lock_acquire+0x2224/0x48a0 [ 2457.932182][ T1670] ? shmem_setattr+0xc80/0xc80 [ 2457.936937][ T1670] ? find_held_lock+0x2d/0x110 [ 2457.941691][ T1670] ? ashmem_shrink_scan+0x302/0x500 [ 2457.946882][ T1670] ? lock_downgrade+0x840/0x840 [ 2457.951724][ T1670] ? ashmem_shrink_scan+0x63/0x500 [ 2457.956833][ T1670] ? lock_release+0x800/0x800 [ 2457.961506][ T1670] ? __mutex_unlock_slowpath+0xe2/0x660 [ 2457.967052][ T1670] ? ion_heap_shrink_count+0x4a/0x100 [ 2457.972416][ T1670] ? wait_for_completion+0x270/0x270 [ 2457.978478][ T1670] ? mutex_trylock+0x246/0x2c0 [ 2457.983238][ T1670] ashmem_shrink_scan+0x34d/0x500 [ 2457.988258][ T1670] ? ion_heap_init_deferred_free.cold+0x95/0x95 [ 2457.994490][ T1670] do_shrink_slab+0x3fa/0xa30 [ 2457.999163][ T1670] shrink_slab+0x16f/0x5f0 [ 2458.003573][ T1670] ? do_shrink_slab+0xa30/0xa30 [ 2458.008417][ T1670] ? preempt_schedule_thunk+0x16/0x18 [ 2458.013778][ T1670] ? int_sqrt+0x8e/0xa0 [ 2458.017922][ T1670] shrink_node+0x53e/0x1c00 [ 2458.022426][ T1670] balance_pgdat+0x753/0x1110 [ 2458.027098][ T1670] ? __node_reclaim+0xb80/0xb80 [ 2458.031955][ T1670] ? _raw_spin_unlock_irq+0x55/0x80 [ 2458.037149][ T1670] ? finish_task_switch+0x147/0x750 [ 2458.042344][ T1670] ? debug_smp_processor_id+0x2f/0x185 [ 2458.047808][ T1670] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2458.053350][ T1670] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2458.059334][ T1670] kswapd+0x5d0/0xe80 [ 2458.063324][ T1670] ? balance_pgdat+0x1110/0x1110 [ 2458.068259][ T1670] ? _raw_spin_unlock_irqrestore+0x62/0xe0 [ 2458.074063][ T1670] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 2458.080097][ T1670] ? finish_wait+0x260/0x260 [ 2458.084714][ T1670] ? __kthread_parkme+0x13f/0x1e0 [ 2458.089733][ T1670] ? balance_pgdat+0x1110/0x1110 [ 2458.094680][ T1670] kthread+0x388/0x470 [ 2458.098744][ T1670] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 2458.104457][ T1670] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 2458.110174][ T1670] ret_from_fork+0x24/0x30 13:43:40 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x6, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x5, @mcast2, 0x7}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, @in6={0xa, 0x4e21, 0x38d5, @rand_addr=' \x01\x00', 0x7}], 0x48) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0xa00, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:40 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x4, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) dup(r4) r5 = gettid() tkill(r5, 0x1004000000013) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f0000000000)={0x64e}) 13:43:40 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x74, 0x2968c2) ioctl$USBDEVFS_IOCTL(r7, 0x8004551a, 0x0) ioctl$LOOP_SET_FD(r6, 0x4c00, r7) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:40 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x06\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:40 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_INFO(r3, 0x81204101, &(0x7f0000000000)) 13:43:40 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x13\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:40 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000001) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) socket$xdp(0x2c, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r6, 0x8004551a, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6a0280, 0x0) lseek(r8, 0x0, 0x0) 13:43:40 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x7f) lseek(r0, 0x0, 0x0) 13:43:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0xc00, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:40 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000000)) 13:43:40 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00@\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:40 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x80000000, 0x3b, [], &(0x7f0000000040)}) lseek(r0, 0x0, 0x0) 13:43:40 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x2) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00!', @ANYRES16=0x0, @ANYBLOB="6ffe0000000000000000030000004c0001800d0001007564703a73797a310000000038000400200001000a004e2400000000ff020000000000000000000000000001db0000001400020002004e247f0000010000000000000000"], 0x60}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="d47adccdc6d39f69279269fe5270ad09a6e425", @ANYRES16=r3, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x40095}, 0x200408c4) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x400, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$KVM_GET_REGS(r11, 0x8090ae81, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) lseek(r5, 0x0, 0x2) 13:43:40 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x7f) lseek(r0, 0x0, 0x0) 13:43:40 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\xff\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:40 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x6040, 0x0) lseek(r0, 0x1, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r6, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r7, 0x2}}, 0x18) r8 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x10802) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000080)={0x16, 0x1a, 0x4, 0x2, 0x101, {0x0, 0x2710}, {0x1, 0x8, 0x1, 0x3, 0x7, 0xfd, "8db56e13"}, 0x71c5, 0x3, @userptr=0x5, 0x1ff, 0x0, r8}) 13:43:41 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x7f) lseek(r0, 0x0, 0x0) 13:43:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0xe00, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:41 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:41 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_netfilter(r3, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x1, 0x0, 0x0, 0x44000}, 0x4000) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) setsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000040)=0x2, 0x4) 13:43:41 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$tipc(r5, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x3, {0x41}}, 0x10) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:41 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x04\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:41 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x7f) lseek(r0, 0x0, 0x0) 13:43:41 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_udp_int(r3, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x1f00, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:41 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3) 13:43:41 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000040)=0x7f) 13:43:41 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x05\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:41 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xa0c1, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x1, 0x8, 0x201, 0x0, 0x0, {0x1, 0x0, 0x2}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x888e}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x34}, 0x1, 0x0, 0x0, 0x20040041}, 0x4410) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) lseek(r1, 0x0, 0x0) 13:43:41 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x111, 0x5}}, 0x20) 13:43:41 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) 13:43:41 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x06\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:41 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:41 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\b\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:41 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) 13:43:41 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x410201, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$rds(r3, &(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x1f06, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:41 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:41 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x10\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:41 executing program 0: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x1, 0x0) 13:43:41 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x220181, 0x0) 13:43:42 executing program 0: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x1, 0x0) 13:43:42 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x13\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:42 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:42 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:42 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() tkill(r3, 0x1004000000013) pidfd_open(r3, 0x0) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:42 executing program 0: openat$sequencer2(0xffffffffffffff9c, 0x0, 0x1, 0x0) 13:43:42 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x01\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x2000, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:42 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 13:43:42 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x02\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:42 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:42 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 13:43:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x2088, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:42 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 13:43:42 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x10\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:42 executing program 1: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x9f, 0x3, 0x2, "4874153f086c5e8c0fbd2b51100d0fde", "efd1f24a3c2c3147ae88fd84b27e6bd1adaa52c2ca00ac8846810d4ca129d0684f344be134c7db86dea36341a9b8fe028683943225841d28c46b8c81f204f57c3fa8a7a799275d0791d523b50d977137f9a3b6e77b5964624226bc900f213f8229b281d30853b5e8158b034070685eb49d2af0ca3ca4f9af92c393e6ca6611f7ab8d2e39c66a2c6b1c7f"}, 0x9f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r7 = inotify_init1(0x0) r8 = inotify_add_watch(r7, &(0x7f00000000c0)='.\x00', 0x20000000) readv(r7, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r7, r8) inotify_rm_watch(0xffffffffffffffff, r8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap$snddsp_control(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x13, r6, 0x83000000) lseek(r0, 0x4, 0x0) r9 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000001, 0x18000) mmap$binder(&(0x7f0000703000/0x1000)=nil, 0x1000, 0x1, 0x11, r9, 0xffffffff) 13:43:45 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r3, 0xb, 0x4) 13:43:45 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x00\x00\x00\x03\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000001) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) socket$xdp(0x2c, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r6, 0x8004551a, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6a0280, 0x0) lseek(r8, 0x0, 0x0) 13:43:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x3f00, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:45 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x02\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x100) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$NFT_MSG_GETOBJ_RESET(r8, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="28000000150a0101000000000000000000000009080003400000004a0900020073797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0xc005ad15b0ca877d) lseek(r0, 0x0, 0x2) 13:43:45 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000001) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) socket$xdp(0x2c, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r6, 0x8004551a, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6a0280, 0x0) lseek(r8, 0x0, 0x0) 13:43:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x4000, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:45 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000001) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) socket$xdp(0x2c, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r6, 0x8004551a, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6a0280, 0x0) lseek(r8, 0x0, 0x0) 13:43:45 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x03\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000140)={0xffffffd7, 0xb69, &(0x7f0000000000)="e95fecd9ddc99cbf72a12bfddc3d461c4b5d9bd6110c31007c87d59416af4c7fb8e28da7ba6345984229904e93b10e0b891848e5dc4ef41ccd91be21ae13ffce6f45b1ec094bf16ca1e5592da6010ca1f66b1e5a8a75eb5b108002f3b740f709a829a0acc4cd144860197f8a9b7508216804a7b87f18c96e221a2a41496b", &(0x7f0000000080)="1472272a0609d331e8f94e9b4163dac964373c1473ddfca4c9f50ed4e650b6af243ce091886e51dfba19fafcbfeb34758e6f5786e217371c446bdbaaa2a548bb6aeb61d99935f7329958fed12bbe9325a3f1ec97ec04db5ada47d642b87449431883f95e86074c575d9ffc6e3aef8c3b5ae1c4c2ed6b2aa504ed757dcfdd3a4ef766", 0x7e, 0x82}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet_sctp_SIOCINQ(r6, 0x541b, &(0x7f00000001c0)) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) timerfd_create(0x6, 0x80000) lseek(r0, 0x2, 0x1) 13:43:45 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x04\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:45 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000001) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) socket$xdp(0x2c, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r6, 0x8004551a, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6a0280, 0x0) 13:43:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x4800, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) 13:43:46 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:46 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x05\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:46 executing program 4: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:46 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\x06\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$FUSE_NOTIFY_STORE(r9, &(0x7f0000000040)={0x32, 0x4, 0x0, {0x5, 0x4, 0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x32) ioctl$PIO_CMAP(r6, 0x4b71, &(0x7f0000000000)={0x0, 0x1a89, 0x7, 0x2, 0x7, 0x3}) lseek(r0, 0x0, 0x2) 13:43:46 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000001) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) socket$xdp(0x2c, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r1, 0x8004551a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r5, 0x8004551a, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r6, 0x8004551a, 0x0) r7 = fcntl$dupfd(r5, 0x406, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 13:43:46 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x4c00, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x3}, @IFLA_BOND_DOWNDELAY={0x8}]}}}]}, 0x44}}, 0x0) 13:43:46 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x02\a\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:46 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000380)='\x00\x00\x00\x03\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xd7\x179f5\x8f\xd6PT\xbcrw\x98\xba)\xfcJ\x8e\x9b\xbfK\xddP\xe1z/kI\x13s\xd6\xe2v\xcea;\xfdo\xd5W\xacEW\xa3\xb3\x8d\xcfH\xc9\x93Y\xab\x96\xec\x18\xea\xe1i\x12.\xd4\xfb\xa9zmU\x8e\xa3p\xa3\xce1\x04\xc0V\xcdg\x1df\a\x1f)5\xa0\x8e\xa3\x13\xfcS\xe0*]\xe1\xf9\x0f\xa1\xb6\x8b\xb05\xf7\xf6\x83\xbe\xf92[\xe7\v\xd9\\\xe3\x1f\x06d\xc6\xf2n\xa50I\xca\x9d\x8ds\x98\x16\xc3ce\xe3Mc\"\xf9\x8f+\x18\x13f\xb0=\xbf\xb8\xf7q\x86X\x9b\xb5\xb0dly\xde\r\xed\xf0-\xb0\xd1g\x8c\x8c\xa4BLvs\x94\x89\x87{\xc9\xff\x02\xc5\x8f\xd1\xae\xe7E\xa6\xe2\x9fk\xf5') 13:43:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x107200, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x41) ioctl$USBDEVFS_IOCTL(r4, 0x8004551a, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000003980fce8cce25a8908d091d6da498eda7b55e241ffba50f2af774e73072e54780f000000000000000000000000000000000000000000000000e85a1c191a16effc00000000000000522d9e31f200007006d7ad50b1b8e5"]) lseek(r0, 0