[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 21.943342][ T8331] bash (8331) used greatest stack depth: 9976 bytes left Warning: Permanently added '10.128.1.5' (ECDSA) to the list of known hosts. 2021/03/04 17:11:25 fuzzer started 2021/03/04 17:11:25 dialing manager at 10.128.0.163:35607 2021/03/04 17:11:26 syscalls: 3540 2021/03/04 17:11:26 code coverage: enabled 2021/03/04 17:11:26 comparison tracing: enabled 2021/03/04 17:11:26 extra coverage: enabled 2021/03/04 17:11:26 setuid sandbox: enabled 2021/03/04 17:11:26 namespace sandbox: enabled 2021/03/04 17:11:26 Android sandbox: /sys/fs/selinux/policy does not exist 2021/03/04 17:11:26 fault injection: enabled 2021/03/04 17:11:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/03/04 17:11:26 net packet injection: enabled 2021/03/04 17:11:26 net device setup: enabled 2021/03/04 17:11:26 concurrency sanitizer: enabled 2021/03/04 17:11:26 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/03/04 17:11:26 USB emulation: enabled 2021/03/04 17:11:26 hci packet injection: enabled 2021/03/04 17:11:26 wifi device emulation: enabled 2021/03/04 17:11:26 802.15.4 emulation: enabled 2021/03/04 17:11:26 suppressing KCSAN reports in functions: 'generic_write_end' '__ext4_new_inode' 'do_nanosleep' 'futex_wait_queue_me' '__xa_clear_mark' 2021/03/04 17:11:26 fetching corpus: 0, signal 0/2000 (executing program) 2021/03/04 17:11:27 fetching corpus: 50, signal 25720/28290 (executing program) 2021/03/04 17:11:28 fetching corpus: 100, signal 35709/38877 (executing program) 2021/03/04 17:11:28 fetching corpus: 150, signal 43358/46773 (executing program) 2021/03/04 17:11:28 fetching corpus: 200, signal 47332/51094 (executing program) 2021/03/04 17:11:28 fetching corpus: 250, signal 52748/56375 (executing program) 2021/03/04 17:11:29 fetching corpus: 300, signal 57310/60621 (executing program) 2021/03/04 17:11:29 fetching corpus: 350, signal 61561/64448 (executing program) 2021/03/04 17:11:29 fetching corpus: 400, signal 66652/68712 (executing program) 2021/03/04 17:11:29 fetching corpus: 450, signal 68373/70237 (executing program) 2021/03/04 17:11:29 fetching corpus: 500, signal 71280/72430 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/73782 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/73849 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/73915 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/73975 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74032 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74108 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74171 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74240 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74295 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74358 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74420 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74491 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74546 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74599 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74664 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74724 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74795 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74851 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74912 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/74972 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/75021 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/75086 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/75139 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/75202 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/75262 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/75324 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/75326 (executing program) 2021/03/04 17:11:30 fetching corpus: 519, signal 73043/75326 (executing program) 2021/03/04 17:11:31 starting 6 fuzzer processes 17:11:31 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="fddbf4f13039f887a168596107e157497eb25e620aa0150b78411b3d3550df23050e6cd76daf9aa25e90c6", 0x2b}, {&(0x7f00000001c0)="2d44430d2b513ae33ab8685fb77b943dcb650cf5082414bac1a4702ceb65997c721f3540ab5bb98c9a4d7e51a2d7b617033029f4a87b994431bb2817d614e97f58e0ccf0993f4c7e201561d279dc2901966c81dbdf", 0x55}], 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 17:11:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:32 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:11:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) 17:11:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv4_newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_FDB={0x4}, @NHA_ENCAP={0x10, 0x11, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_NAME={0x5, 0x2, '\x00'}}}]}, 0x2c}}, 0x0) 17:11:32 executing program 5: set_mempolicy(0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x3}, 0x40) [ 35.349051][ T8368] IPVS: ftp: loaded support on port[0] = 21 [ 35.430765][ T8368] chnl_net:caif_netlink_parms(): no params data found [ 35.456849][ T8368] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.464016][ T8368] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.471626][ T8368] device bridge_slave_0 entered promiscuous mode [ 35.478848][ T8368] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.485961][ T8368] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.493249][ T8368] device bridge_slave_1 entered promiscuous mode [ 35.506084][ T8368] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.516392][ T8368] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.532071][ T8368] team0: Port device team_slave_0 added [ 35.538666][ T8368] team0: Port device team_slave_1 added [ 35.551798][ T8368] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.558774][ T8368] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.584853][ T8368] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.598074][ T8368] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.605109][ T8368] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.639239][ T8368] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.654760][ T8370] IPVS: ftp: loaded support on port[0] = 21 [ 35.664054][ T8368] device hsr_slave_0 entered promiscuous mode [ 35.672751][ T8368] device hsr_slave_1 entered promiscuous mode [ 35.753758][ T8370] chnl_net:caif_netlink_parms(): no params data found [ 35.768464][ T8372] IPVS: ftp: loaded support on port[0] = 21 [ 35.787633][ T8368] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 35.797075][ T8368] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 35.825278][ T8368] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 35.834639][ T8368] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 35.855409][ T8370] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.862485][ T8370] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.869850][ T8370] device bridge_slave_0 entered promiscuous mode [ 35.877340][ T8370] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.884578][ T8370] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.891953][ T8370] device bridge_slave_1 entered promiscuous mode [ 35.918549][ T8368] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.925590][ T8368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.932913][ T8368] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.939949][ T8368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.957888][ T8374] IPVS: ftp: loaded support on port[0] = 21 [ 35.962405][ T8370] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.976179][ T8370] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.992858][ T8370] team0: Port device team_slave_0 added [ 35.999737][ T8370] team0: Port device team_slave_1 added [ 36.014689][ T8370] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.021735][ T8370] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.047966][ T8370] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.078995][ T8376] IPVS: ftp: loaded support on port[0] = 21 [ 36.083905][ T8370] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.096528][ T8370] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.123697][ T8370] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.167672][ T8372] chnl_net:caif_netlink_parms(): no params data found [ 36.180046][ T8370] device hsr_slave_0 entered promiscuous mode [ 36.187049][ T8370] device hsr_slave_1 entered promiscuous mode [ 36.193375][ T8370] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.200904][ T8370] Cannot create hsr debugfs directory [ 36.284254][ T8372] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.287443][ T8380] IPVS: ftp: loaded support on port[0] = 21 [ 36.301842][ T8372] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.309320][ T8372] device bridge_slave_0 entered promiscuous mode [ 36.321738][ T8368] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.328745][ T8372] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.336628][ T8372] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.344554][ T8372] device bridge_slave_1 entered promiscuous mode [ 36.380287][ T8374] chnl_net:caif_netlink_parms(): no params data found [ 36.403466][ T8372] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.428030][ T8372] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.437417][ T8376] chnl_net:caif_netlink_parms(): no params data found [ 36.462330][ T8768] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.469849][ T8768] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.478870][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 36.500389][ T8372] team0: Port device team_slave_0 added [ 36.522780][ T8372] team0: Port device team_slave_1 added [ 36.537123][ T8372] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.544479][ T8372] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.570847][ T8372] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.583999][ T8368] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.591545][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 36.599117][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.607013][ T8374] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.614154][ T8374] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.621902][ T8374] device bridge_slave_0 entered promiscuous mode [ 36.629007][ T8370] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 36.639968][ T8372] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.648516][ T8372] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.674655][ T8372] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.691037][ T3658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 36.699379][ T3658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.707893][ T3658] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.714915][ T3658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.722567][ T3658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 36.730900][ T3658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.739452][ T3658] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.746478][ T3658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.754201][ T3658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 36.762902][ T8374] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.769916][ T8374] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.777385][ T8374] device bridge_slave_1 entered promiscuous mode [ 36.784279][ T8370] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 36.805084][ T8376] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.812263][ T8376] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.819578][ T8376] device bridge_slave_0 entered promiscuous mode [ 36.829583][ T8376] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.837362][ T8376] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.845119][ T8376] device bridge_slave_1 entered promiscuous mode [ 36.852030][ T8370] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 36.860904][ T8370] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 36.873817][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 36.900543][ T8380] chnl_net:caif_netlink_parms(): no params data found [ 36.916413][ T8372] device hsr_slave_0 entered promiscuous mode [ 36.923197][ T8372] device hsr_slave_1 entered promiscuous mode [ 36.929666][ T8372] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 36.937445][ T8372] Cannot create hsr debugfs directory [ 36.946575][ T8374] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.957886][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 36.966907][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 36.991254][ T8376] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.005359][ T8374] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.015222][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 37.024221][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 37.032762][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 37.051366][ T8376] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.091188][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.102352][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.110326][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.118652][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.130453][ T8380] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.137712][ T8380] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.145414][ T8380] device bridge_slave_0 entered promiscuous mode [ 37.153666][ T8368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 37.166545][ T8374] team0: Port device team_slave_0 added [ 37.174734][ T8374] team0: Port device team_slave_1 added [ 37.183897][ T8376] team0: Port device team_slave_0 added [ 37.190829][ T8376] team0: Port device team_slave_1 added [ 37.196643][ T8380] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.204095][ T8380] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.211718][ T8380] device bridge_slave_1 entered promiscuous mode [ 37.225641][ T8372] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 37.238060][ T8372] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.256214][ T8374] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.263184][ T8374] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.290450][ T8374] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.307022][ T8372] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.316609][ T8374] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.324134][ T8374] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.350072][ T8374] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.361780][ T8380] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.373823][ T8380] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.383239][ T8376] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.390173][ T8376] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.416780][ T9216] Bluetooth: hci0: command 0x0409 tx timeout [ 37.417850][ T8376] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.434981][ T8376] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.441998][ T8376] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.467978][ T8376] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.479466][ T8372] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.499509][ T8374] device hsr_slave_0 entered promiscuous mode [ 37.506440][ T8374] device hsr_slave_1 entered promiscuous mode [ 37.513012][ T8374] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.520554][ T8374] Cannot create hsr debugfs directory [ 37.543576][ T8376] device hsr_slave_0 entered promiscuous mode [ 37.550026][ T8376] device hsr_slave_1 entered promiscuous mode [ 37.556382][ T8376] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.563957][ T8376] Cannot create hsr debugfs directory [ 37.573479][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 37.581147][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 37.607032][ T8380] team0: Port device team_slave_0 added [ 37.615836][ T8380] team0: Port device team_slave_1 added [ 37.623487][ T8368] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.640906][ T9463] Bluetooth: hci1: command 0x0409 tx timeout [ 37.649782][ T8370] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.676908][ T8370] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.687425][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.695093][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.702847][ T8380] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.709774][ T8380] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.736191][ T8380] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.748068][ T8380] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.755018][ T8380] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.781156][ T8380] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.798982][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.807342][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.810896][ T9597] Bluetooth: hci2: command 0x0409 tx timeout [ 37.817201][ T9216] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.828290][ T9216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.836091][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 37.844739][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.853487][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 37.879365][ T8380] device hsr_slave_0 entered promiscuous mode [ 37.886038][ T8380] device hsr_slave_1 entered promiscuous mode [ 37.892526][ T8380] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.900120][ T8380] Cannot create hsr debugfs directory [ 37.918823][ T8368] device veth0_vlan entered promiscuous mode [ 37.937027][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.946149][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.954931][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.962063][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.969940][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 37.970746][ T9597] Bluetooth: hci3: command 0x0409 tx timeout [ 37.978186][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.992713][ T8374] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 38.007611][ T8374] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 38.016753][ T8374] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 38.031634][ T8374] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 38.042672][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.052541][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.060370][ T9216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.075435][ T8368] device veth1_vlan entered promiscuous mode [ 38.097285][ T8376] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 38.108960][ T8372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.117091][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 38.126646][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.130764][ T9636] Bluetooth: hci4: command 0x0409 tx timeout [ 38.136861][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 38.150307][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 38.158765][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 38.180903][ T8376] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 38.196217][ T8372] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.205542][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 38.213558][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 38.222257][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 38.230598][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.239010][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.247162][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.255476][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.263742][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.271441][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.280638][ T8370] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 38.291440][ T9636] Bluetooth: hci5: command 0x0409 tx timeout [ 38.293450][ T8376] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 38.307585][ T8376] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 38.338908][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.349981][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.358623][ T9636] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.365650][ T9636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.373793][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.382277][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.390446][ T9636] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.397532][ T9636] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.405319][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.414355][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.422958][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 38.430348][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 38.439685][ T8380] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 38.455144][ T8380] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 38.463751][ T8380] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 38.478360][ T8370] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.486065][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.504345][ T8372] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.514843][ T8372] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.527542][ T8380] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 38.541369][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 38.549899][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 38.558858][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 38.567441][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 38.576143][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.584580][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.593002][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.601366][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.609381][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.618058][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.626927][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 38.635224][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 38.643944][ T8368] device veth0_macvtap entered promiscuous mode [ 38.658814][ T8374] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.676801][ T8368] device veth1_macvtap entered promiscuous mode [ 38.686663][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.694184][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.715480][ T8374] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.725632][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 38.733354][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 38.744437][ T8372] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.772352][ T8368] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.780002][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.789131][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.798639][ T9681] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.805667][ T9681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.813620][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.822062][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.830178][ T9681] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.837277][ T9681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.844905][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.853553][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.862017][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.870417][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.892188][ T8376] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.904121][ T8368] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.911467][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.919163][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.927814][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.936503][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.945268][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.954007][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.962615][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.979844][ T8372] device veth0_vlan entered promiscuous mode [ 38.988807][ T8380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 39.003829][ T8368] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.012952][ T8368] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.021883][ T8368] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.030829][ T8368] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.040572][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.049236][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.057900][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.065682][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.073542][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.082221][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.090975][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.099384][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.113593][ T8372] device veth1_vlan entered promiscuous mode [ 39.126661][ T8380] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.135551][ T8376] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.143284][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.152555][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.159980][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 39.168093][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 39.177374][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.185602][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.195099][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.203238][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.212776][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.220223][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.233086][ T8374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 39.256342][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 39.264403][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.272740][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.281756][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.290042][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.298615][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.305711][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.313472][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.322137][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.330251][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.337369][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.345141][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.353700][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.361837][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.368870][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.376601][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.385080][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.393234][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.400238][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.409291][ T8370] device veth0_vlan entered promiscuous mode [ 39.426091][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.433631][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.441425][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.449136][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.457299][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.465870][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.474648][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 39.483441][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 39.491020][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 39.498354][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.506808][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.515310][ T9215] Bluetooth: hci0: command 0x041b tx timeout [ 39.533621][ T8374] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.548547][ T8372] device veth0_macvtap entered promiscuous mode [ 39.555534][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 39.563856][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 39.572544][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.580961][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.589228][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.597758][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.606240][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.614749][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.623367][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 39.631910][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.641040][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 39.648789][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 39.660695][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.668873][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.678969][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.687297][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.703422][ T8370] device veth1_vlan entered promiscuous mode [ 39.712717][ T8372] device veth1_macvtap entered promiscuous mode [ 39.730329][ T9215] Bluetooth: hci1: command 0x041b tx timeout [ 39.733925][ T8380] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.747165][ T8380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 39.762608][ T8376] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.773226][ T8376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 39.785370][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.793721][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.802001][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.810707][ T9681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.848125][ T3008] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 39.851813][ T8374] device veth0_vlan entered promiscuous mode [ 39.876392][ T8372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 39.879399][ T3008] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 39.889099][ T8372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 39.894301][ T9681] Bluetooth: hci2: command 0x041b tx timeout [ 39.906260][ T8372] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.919749][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 39.928347][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.936861][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 39.944690][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.952908][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.961602][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 39.970001][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.987077][ T8374] device veth1_vlan entered promiscuous mode [ 39.997113][ T8372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.007607][ T8372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.018549][ T8372] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.028686][ T8372] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.039983][ T8372] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.048952][ T9597] Bluetooth: hci3: command 0x041b tx timeout [ 40.050942][ T8372] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.063619][ T8372] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.074488][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.082893][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.090477][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 40.098280][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.106118][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.113697][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 40.122152][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.135359][ T8380] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.149620][ T8376] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.165996][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 40.180451][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 40.188008][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 40.188650][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.203656][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.211491][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 40.219265][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.227900][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.238913][ T9463] Bluetooth: hci4: command 0x041b tx timeout [ 40.263418][ T8370] device veth0_macvtap entered promiscuous mode [ 40.275698][ T8370] device veth1_macvtap entered promiscuous mode [ 40.286456][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 40.295918][ T9463] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 17:11:38 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="fddbf4f13039f887a168596107e157497eb25e620aa0150b78411b3d3550df23050e6cd76daf9aa25e90c6", 0x2b}, {&(0x7f00000001c0)="2d44430d2b513ae33ab8685fb77b943dcb650cf5082414bac1a4702ceb65997c721f3540ab5bb98c9a4d7e51a2d7b617033029f4a87b994431bb2817d614e97f58e0ccf0993f4c7e201561d279dc2901966c81dbdf", 0x55}], 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 40.326570][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.330586][ T2942] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 40.345489][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.350368][ T2942] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 40.366871][ T9463] Bluetooth: hci5: command 0x041b tx timeout [ 40.385826][ T8374] device veth0_macvtap entered promiscuous mode [ 40.407717][ T8370] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 17:11:38 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="fddbf4f13039f887a168596107e157497eb25e620aa0150b78411b3d3550df23050e6cd76daf9aa25e90c6", 0x2b}, {&(0x7f00000001c0)="2d44430d2b513ae33ab8685fb77b943dcb650cf5082414bac1a4702ceb65997c721f3540ab5bb98c9a4d7e51a2d7b617033029f4a87b994431bb2817d614e97f58e0ccf0993f4c7e201561d279dc2901966c81dbdf", 0x55}], 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 40.434995][ T8370] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.458950][ T8370] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.469980][ T8370] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.482897][ T8370] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.497840][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 40.509058][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 40.518384][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.528065][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 17:11:38 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="fddbf4f13039f887a168596107e157497eb25e620aa0150b78411b3d3550df23050e6cd76daf9aa25e90c6", 0x2b}, {&(0x7f00000001c0)="2d44430d2b513ae33ab8685fb77b943dcb650cf5082414bac1a4702ceb65997c721f3540ab5bb98c9a4d7e51a2d7b617033029f4a87b994431bb2817d614e97f58e0ccf0993f4c7e201561d279dc2901966c81dbdf", 0x55}], 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 40.539637][ T8374] device veth1_macvtap entered promiscuous mode [ 40.554675][ T8370] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.565658][ T8370] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.577420][ T8370] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.588267][ T8370] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.601327][ T8370] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 40.613394][ T3008] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 40.617989][ T8370] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.633865][ T3008] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 40.635754][ T8370] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.656366][ T8370] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.668852][ T8370] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 17:11:38 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="fddbf4f13039f887a168596107e157497eb25e620aa0150b78411b3d3550df23050e6cd76daf9aa25e90c6", 0x2b}, {&(0x7f00000001c0)="2d44430d2b513ae33ab8685fb77b943dcb650cf5082414bac1a4702ceb65997c721f3540ab5bb98c9a4d7e51a2d7b617033029f4a87b994431bb2817d614e97f58e0ccf0993f4c7e201561d279dc2901966c81dbdf", 0x55}], 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 40.697360][ T8374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.709422][ T8374] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.719844][ T8374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.730723][ T8374] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.740915][ T8374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 40.751657][ T8374] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.764127][ T8374] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 40.774519][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 40.783559][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 17:11:38 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="fddbf4f13039f887a168596107e157497eb25e620aa0150b78411b3d3550df23050e6cd76daf9aa25e90c6", 0x2b}, {&(0x7f00000001c0)="2d44430d2b513ae33ab8685fb77b943dcb650cf5082414bac1a4702ceb65997c721f3540ab5bb98c9a4d7e51a2d7b617033029f4a87b994431bb2817d614e97f58e0ccf0993f4c7e201561d279dc2901966c81dbdf", 0x55}], 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 40.800652][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.809247][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 40.817262][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.826025][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.837150][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 17:11:38 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="fddbf4f13039f887a168596107e157497eb25e620aa0150b78411b3d3550df23050e6cd76daf9aa25e90c6", 0x2b}, {&(0x7f00000001c0)="2d44430d2b513ae33ab8685fb77b943dcb650cf5082414bac1a4702ceb65997c721f3540ab5bb98c9a4d7e51a2d7b617033029f4a87b994431bb2817d614e97f58e0ccf0993f4c7e201561d279dc2901966c81dbdf", 0x55}], 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 40.846314][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.865728][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 40.874501][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 17:11:38 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="fddbf4f13039f887a168596107e157497eb25e620aa0150b78411b3d3550df23050e6cd76daf9aa25e90c6", 0x2b}, {&(0x7f00000001c0)="2d44430d2b513ae33ab8685fb77b943dcb650cf5082414bac1a4702ceb65997c721f3540ab5bb98c9a4d7e51a2d7b617033029f4a87b994431bb2817d614e97f58e0ccf0993f4c7e201561d279dc2901966c81dbdf", 0x55}], 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 40.899968][ T8376] device veth0_vlan entered promiscuous mode [ 40.918504][ T8374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.931633][ T8374] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.942201][ T8374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.958107][ T8374] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.969316][ T8374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 40.981884][ T8374] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 40.994187][ T8374] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.010905][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.018911][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.032363][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.043183][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.061363][ T8374] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.078005][ T8374] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.087093][ T8374] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.096071][ T8374] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.116337][ T8376] device veth1_vlan entered promiscuous mode [ 41.125151][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.135236][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.145836][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.167652][ T8380] device veth0_vlan entered promiscuous mode [ 41.220961][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 41.228832][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.243620][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.252510][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.261159][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.277812][ T8380] device veth1_vlan entered promiscuous mode [ 41.286937][ T8376] device veth0_macvtap entered promiscuous mode [ 41.297870][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.308119][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.317221][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.325542][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.348573][ T8376] device veth1_macvtap entered promiscuous mode [ 41.370253][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 41.378108][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.387680][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.396196][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.406267][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.415175][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 41.424339][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 41.439391][ T8380] device veth0_macvtap entered promiscuous mode [ 41.447480][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.457424][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 41.458979][ T8376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.476942][ T8376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.487528][ T8376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.498688][ T8376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.508869][ T8376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.519659][ T8376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.529746][ T8376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.540623][ T8376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.551965][ T8376] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.564542][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.572557][ T9671] Bluetooth: hci0: command 0x040f tx timeout [ 41.579657][ T8376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.593251][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 41.599067][ T8376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.611727][ T8376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.622253][ T8376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.632128][ T8376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.642949][ T8376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.652815][ T8376] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 41.663249][ T8376] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.674523][ T8376] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.682013][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.690094][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 41.697773][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.707254][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.716262][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 41.724436][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.733023][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.742873][ T8380] device veth1_macvtap entered promiscuous mode [ 41.768995][ T8376] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.777904][ T8376] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.786893][ T8376] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.797464][ T8376] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 41.806948][ T9671] Bluetooth: hci1: command 0x040f tx timeout [ 41.820035][ T8380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.830492][ T8380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.840330][ T8380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.850820][ T8380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.861630][ T8380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.872065][ T8380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.882092][ T8380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.892763][ T8380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.902920][ T8380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 41.913565][ T8380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 41.925335][ T8380] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.933149][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.941311][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.949687][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.962478][ T9671] Bluetooth: hci2: command 0x040f tx timeout [ 41.962849][ T3008] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 41.977426][ T3008] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 41.991156][ T3597] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 42.005776][ T8380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.020437][ T8380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.032921][ T8380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.043805][ T8380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.054355][ T8380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.065545][ T8380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.075812][ T8380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.086298][ T8380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.096329][ T8380] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.106885][ T8380] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:11:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:39 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="fddbf4f13039f887a168596107e157497eb25e620aa0150b78411b3d3550df23050e6cd76daf9aa25e90c6", 0x2b}, {&(0x7f00000001c0)="2d44430d2b513ae33ab8685fb77b943dcb650cf5082414bac1a4702ceb65997c721f3540ab5bb98c9a4d7e51a2d7b617033029f4a87b994431bb2817d614e97f58e0ccf0993f4c7e201561d279dc2901966c81dbdf", 0x55}], 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) [ 42.117990][ T8380] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 42.127083][ T5] Bluetooth: hci3: command 0x040f tx timeout [ 42.144684][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.154772][ T9636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.191868][ T8380] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.208419][ T8380] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.231883][ T8380] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.246346][ T8380] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.285966][ T2942] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 42.291063][ T9636] Bluetooth: hci4: command 0x040f tx timeout [ 42.316603][ T2942] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 42.339827][ C1] hrtimer: interrupt took 36626 ns [ 42.378887][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 42.386222][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 42.419338][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 42.446193][ T9597] Bluetooth: hci5: command 0x040f tx timeout [ 42.524121][ T9597] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 42.544996][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 42.580881][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:11:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) [ 42.667991][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 42.704349][ T9847] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 17:11:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv4_newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_FDB={0x4}, @NHA_ENCAP={0x10, 0x11, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_NAME={0x5, 0x2, '\x00'}}}]}, 0x2c}}, 0x0) [ 42.717277][ T9847] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 42.755019][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:11:40 executing program 5: set_mempolicy(0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x3}, 0x40) 17:11:40 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:11:40 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000240)=[{&(0x7f0000000100)="fddbf4f13039f887a168596107e157497eb25e620aa0150b78411b3d3550df23050e6cd76daf9aa25e90c6", 0x2b}, {&(0x7f00000001c0)="2d44430d2b513ae33ab8685fb77b943dcb650cf5082414bac1a4702ceb65997c721f3540ab5bb98c9a4d7e51a2d7b617033029f4a87b994431bb2817d614e97f58e0ccf0993f4c7e201561d279dc2901966c81dbdf", 0x55}], 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x30007, 0x0) 17:11:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv4_newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_FDB={0x4}, @NHA_ENCAP={0x10, 0x11, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_NAME={0x5, 0x2, '\x00'}}}]}, 0x2c}}, 0x0) 17:11:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv4_newnexthop={0x2c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_FDB={0x4}, @NHA_ENCAP={0x10, 0x11, 0x0, 0x1, @LWT_BPF_OUT={0xc, 0x2, 0x0, 0x1, @LWT_BPF_PROG_NAME={0x5, 0x2, '\x00'}}}]}, 0x2c}}, 0x0) 17:11:40 executing program 5: set_mempolicy(0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x3}, 0x40) 17:11:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) 17:11:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) 17:11:40 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:11:41 executing program 5: set_mempolicy(0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x3}, 0x40) 17:11:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) 17:11:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) 17:11:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) 17:11:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) [ 43.664124][ T5] Bluetooth: hci0: command 0x0419 tx timeout 17:11:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) [ 43.889252][ T9267] Bluetooth: hci1: command 0x0419 tx timeout 17:11:41 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:11:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) 17:11:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) [ 44.075761][ T9597] Bluetooth: hci2: command 0x0419 tx timeout [ 44.274990][ T3658] Bluetooth: hci3: command 0x0419 tx timeout 17:11:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) 17:11:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) [ 44.536840][ T9267] Bluetooth: hci4: command 0x0419 tx timeout [ 44.546233][ T3658] Bluetooth: hci5: command 0x0419 tx timeout [ 44.575777][ T9915] syz-executor.5 (9915) used greatest stack depth: 9848 bytes left 17:11:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) 17:11:42 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x20000009}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xd0}}, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f0000000040)=""/57, 0x39}], 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="03", 0xfffffdef, 0x40080, 0x0, 0x1f4) 17:11:43 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="020c09072200000029bd7000ffdbdf250800120000000400b36b6e000900000006006c000007000000100000000000007f00000100000000000000000000000000000000000000000000ffff000000000100140080000000010016004e2000001200180081ff880000bac454ffb5a3df4bf618aef4ed8afff5d014e81908a758a3246140c3321b01ad0f622aa0413577ed708288ef4d2340e28d8ff5ea94069477f16e1accd78ca4fe8f7242e0c09c9cd68f3d23fd63b7572e62b91bb0bd1a1563a24457de44f70512cb3795c5414eec0ef277b8ed2e2b4e932484dbef2451538d7e2c7343dba72cf2aa6ce90d3f610a0400040000000000ff030000000000000500000000000000fffffeffffffffff"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="020c09072200000029bd7000ffdbdf250800120000000400b36b6e000900000006006c000007000000100000000000007f00000100000000000000000000000000000000000000000000ffff000000000100140080000000010016004e2000001200180081ff880000bac454ffb5a3df4bf618aef4ed8afff5d014e81908a758a3246140c3321b01ad0f622aa0413577ed708288ef4d2340e28d8ff5ea94069477f16e1accd78ca4fe8f7242e0c09c9cd68f3d23fd63b7572e62b91bb0bd1a1563a24457de44f70512cb3795c5414eec0ef277b8ed2e2b4e932484dbef2451538d7e2c7343dba72cf2aa6ce90d3f610a0400040000000000ff030000000000000500000000000000fffffeffffffffff"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="020c09072200000029bd7000ffdbdf250800120000000400b36b6e000900000006006c000007000000100000000000007f00000100000000000000000000000000000000000000000000ffff000000000100140080000000010016004e2000001200180081ff880000bac454ffb5a3df4bf618aef4ed8afff5d014e81908a758a3246140c3321b01ad0f622aa0413577ed708288ef4d2340e28d8ff5ea94069477f16e1accd78ca4fe8f7242e0c09c9cd68f3d23fd63b7572e62b91bb0bd1a1563a24457de44f70512cb3795c5414eec0ef277b8ed2e2b4e932484dbef2451538d7e2c7343dba72cf2aa6ce90d3f610a0400040000000000ff030000000000000500000000000000fffffeffffffffff"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="020c09072200000029bd7000ffdbdf250800120000000400b36b6e000900000006006c000007000000100000000000007f00000100000000000000000000000000000000000000000000ffff000000000100140080000000010016004e2000001200180081ff880000bac454ffb5a3df4bf618aef4ed8afff5d014e81908a758a3246140c3321b01ad0f622aa0413577ed708288ef4d2340e28d8ff5ea94069477f16e1accd78ca4fe8f7242e0c09c9cd68f3d23fd63b7572e62b91bb0bd1a1563a24457de44f70512cb3795c5414eec0ef277b8ed2e2b4e932484dbef2451538d7e2c7343dba72cf2aa6ce90d3f610a0400040000000000ff030000000000000500000000000000fffffeffffffffff"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="020c09072200000029bd7000ffdbdf250800120000000400b36b6e000900000006006c000007000000100000000000007f00000100000000000000000000000000000000000000000000ffff000000000100140080000000010016004e2000001200180081ff880000bac454ffb5a3df4bf618aef4ed8afff5d014e81908a758a3246140c3321b01ad0f622aa0413577ed708288ef4d2340e28d8ff5ea94069477f16e1accd78ca4fe8f7242e0c09c9cd68f3d23fd63b7572e62b91bb0bd1a1563a24457de44f70512cb3795c5414eec0ef277b8ed2e2b4e932484dbef2451538d7e2c7343dba72cf2aa6ce90d3f610a0400040000000000ff030000000000000500000000000000fffffeffffffffff"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="020c09072200000029bd7000ffdbdf250800120000000400b36b6e000900000006006c000007000000100000000000007f00000100000000000000000000000000000000000000000000ffff000000000100140080000000010016004e2000001200180081ff880000bac454ffb5a3df4bf618aef4ed8afff5d014e81908a758a3246140c3321b01ad0f622aa0413577ed708288ef4d2340e28d8ff5ea94069477f16e1accd78ca4fe8f7242e0c09c9cd68f3d23fd63b7572e62b91bb0bd1a1563a24457de44f70512cb3795c5414eec0ef277b8ed2e2b4e932484dbef2451538d7e2c7343dba72cf2aa6ce90d3f610a0400040000000000ff030000000000000500000000000000fffffeffffffffff"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="020c09072200000029bd7000ffdbdf250800120000000400b36b6e000900000006006c000007000000100000000000007f00000100000000000000000000000000000000000000000000ffff000000000100140080000000010016004e2000001200180081ff880000bac454ffb5a3df4bf618aef4ed8afff5d014e81908a758a3246140c3321b01ad0f622aa0413577ed708288ef4d2340e28d8ff5ea94069477f16e1accd78ca4fe8f7242e0c09c9cd68f3d23fd63b7572e62b91bb0bd1a1563a24457de44f70512cb3795c5414eec0ef277b8ed2e2b4e932484dbef2451538d7e2c7343dba72cf2aa6ce90d3f610a0400040000000000ff030000000000000500000000000000fffffeffffffffff"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:11:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="020c09072200000029bd7000ffdbdf250800120000000400b36b6e000900000006006c000007000000100000000000007f00000100000000000000000000000000000000000000000000ffff000000000100140080000000010016004e2000001200180081ff880000bac454ffb5a3df4bf618aef4ed8afff5d014e81908a758a3246140c3321b01ad0f622aa0413577ed708288ef4d2340e28d8ff5ea94069477f16e1accd78ca4fe8f7242e0c09c9cd68f3d23fd63b7572e62b91bb0bd1a1563a24457de44f70512cb3795c5414eec0ef277b8ed2e2b4e932484dbef2451538d7e2c7343dba72cf2aa6ce90d3f610a0400040000000000ff030000000000000500000000000000fffffeffffffffff"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:11:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x2, 0x1, 0x2, 0xb, 0xd, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_sa={0x2, 0x1, 0x4d4, 0x3, 0xff, 0x39, 0x3, 0x20000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x6e6bbe, 0xfff, {0x6, 0xff, 0x20, 0x1f, 0x0, 0xfffffffa, 0x0, @in6=@loopback, @in=@rand_addr=0x64010102}}]}, 0x68}}, 0x4000885) sendmsg$key(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00040090000100000000000030005007217440502000000e0000009d1c900c98148021f8697037d3f8c627aaeeaa72d275b2eaae637608e099a9d165b83f57de2e1e991c0160eadb9c2c8ba134442abae71bb55c8a500"/125], 0x40}}, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x3800}}], 0xc6, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000300)=0x800, 0x4) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = signalfd(r2, &(0x7f0000000040)={[0x3]}, 0x8) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x4800, 0x0) sendmsg$key(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b40)={0x2, 0x4, 0xfb, 0x8, 0x20, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_x_nat_t_type={0x1}, @sadb_ident={0x2, 0xb, 0xfff, 0x0, 0x3f}, @sadb_key={0x13, 0x8, 0x460, 0x0, "b0a2f4cccf682e27c8c02348bbcbb7f5e28f5eb656671f7506076471968913d750403ca5bdcac4c013d740d31b910198ffff32c14182a819b0c53e767d2cefa73f7b3b4331bd870a1aad861c74d71b8c3a1ac98f877562f3785121aa3a7843d383a40530f4ea025a81b510347bcbbfd819de1e5c2ed221f6ce2301ca2da1140f424e71100231279c398b193e"}, @sadb_lifetime={0x4, 0x2, 0x5, 0x200ffffffff, 0x6, 0x20}, @sadb_lifetime={0x4, 0x3, 0xffffff7f, 0x4, 0x1, 0x401}]}, 0x100}}, 0x20008104) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r6 = openat(r5, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) sendmsg$key(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x110}}, 0x10) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuse\x00', 0x1200431, &(0x7f0000000980)=ANY=[@ANYBLOB="23e6d57cb66cfc2cd5e2178213641742299a8124d0006ff835a3dccc689ba14726fe5b0b3aca8bd519877d0921b176f3d9d4095f39a2b7218b6171f3d5a214867120c28bfccb091a0a2d11db49d49fc709c8b8c45278828c3731cee762d261df2f712724a842a349075010003cfd975869ff94ddf2123a4e56fd45ee4ebc3d2d781696a1d76bea612a", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000000400,max_read=0x0000000000000007,blksize=0x0000000000000000,blksize=0x0000000000001800,blksize=0x0000000000001200,measure,subj_type=*.{,\x00']) sendfile(r6, r6, 0x0, 0x7fffffff) getsockopt$sock_int(r6, 0x1, 0x27, &(0x7f0000000180), &(0x7f00000001c0)=0x4) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x3c, 0x0, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:11:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:11:44 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:11:44 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) [ 46.481677][ T8380] ================================================================== [ 46.489775][ T8380] BUG: KCSAN: data-race in ext4_mark_iloc_dirty / ext4_orphan_del [ 46.497615][ T8380] [ 46.499933][ T8380] write to 0xffff88810dbb61fc of 4 bytes by task 8374 on cpu 0: [ 46.507541][ T8380] ext4_orphan_del+0x2fc/0x4a0 [ 46.512285][ T8380] ext4_evict_inode+0xb90/0xef0 [ 46.517152][ T8380] evict+0x1aa/0x410 [ 46.521027][ T8380] iput+0x3fd/0x520 [ 46.524825][ T8380] do_unlinkat+0x2e9/0x4f0 [ 46.529219][ T8380] __x64_sys_unlink+0x2c/0x30 [ 46.533876][ T8380] do_syscall_64+0x39/0x80 [ 46.538273][ T8380] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 46.544147][ T8380] [ 46.546447][ T8380] read to 0xffff88810dbb61fc of 4 bytes by task 8380 on cpu 1: [ 46.553961][ T8380] ext4_mark_iloc_dirty+0x889/0x16f0 [ 46.559219][ T8380] __ext4_mark_inode_dirty+0x4db/0x5e0 [ 46.564656][ T8380] __ext4_unlink+0x501/0x6c0 [ 46.569221][ T8380] ext4_unlink+0x1f1/0x3f0 [ 46.573618][ T8380] vfs_unlink+0x24a/0x3e0 [ 46.577923][ T8380] do_unlinkat+0x29f/0x4f0 [ 46.582312][ T8380] __x64_sys_unlink+0x2c/0x30 [ 46.586969][ T8380] do_syscall_64+0x39/0x80 [ 46.591371][ T8380] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 46.597240][ T8380] [ 46.599541][ T8380] Reported by Kernel Concurrency Sanitizer on: [ 46.605662][ T8380] CPU: 1 PID: 8380 Comm: syz-executor.5 Not tainted 5.12.0-rc1-syzkaller #0 [ 46.614309][ T8380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.624474][ T8380] ================================================================== [ 46.632512][ T8380] Kernel panic - not syncing: panic_on_warn set ... [ 46.639071][ T8380] CPU: 1 PID: 8380 Comm: syz-executor.5 Not tainted 5.12.0-rc1-syzkaller #0 [ 46.647798][ T8380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.657835][ T8380] Call Trace: [ 46.661101][ T8380] dump_stack+0x137/0x19d [ 46.665413][ T8380] panic+0x1e7/0x5fa [ 46.669289][ T8380] ? vprintk_emit+0x2fa/0x3e0 [ 46.673948][ T8380] kcsan_report+0x67b/0x680 [ 46.678430][ T8380] ? put_dec_trunc8+0x10e/0x130 [ 46.683254][ T8380] ? kcsan_setup_watchpoint+0x40b/0x470 [ 46.688776][ T8380] ? ext4_mark_iloc_dirty+0x889/0x16f0 [ 46.694250][ T8380] ? __ext4_mark_inode_dirty+0x4db/0x5e0 [ 46.699959][ T8380] ? __ext4_unlink+0x501/0x6c0 [ 46.704704][ T8380] ? ext4_unlink+0x1f1/0x3f0 [ 46.709270][ T8380] ? vfs_unlink+0x24a/0x3e0 [ 46.713754][ T8380] ? do_unlinkat+0x29f/0x4f0 [ 46.718325][ T8380] ? __x64_sys_unlink+0x2c/0x30 [ 46.723149][ T8380] ? do_syscall_64+0x39/0x80 [ 46.727772][ T8380] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 46.733829][ T8380] ? __find_get_block+0x4de/0x640 [ 46.738834][ T8380] ? __getblk_gfp+0x3a/0x1f0 [ 46.743401][ T8380] kcsan_setup_watchpoint+0x40b/0x470 [ 46.748751][ T8380] ext4_mark_iloc_dirty+0x889/0x16f0 [ 46.754014][ T8380] ? ext4_reserve_inode_write+0x17a/0x1f0 [ 46.759709][ T8380] __ext4_mark_inode_dirty+0x4db/0x5e0 [ 46.765146][ T8380] ? ext4_orphan_add+0x504/0x5f0 [ 46.770060][ T8380] ? ktime_get_coarse_real_ts64+0x10d/0x120 [ 46.775951][ T8380] __ext4_unlink+0x501/0x6c0 [ 46.780523][ T8380] ext4_unlink+0x1f1/0x3f0 [ 46.784920][ T8380] vfs_unlink+0x24a/0x3e0 [ 46.789226][ T8380] do_unlinkat+0x29f/0x4f0 [ 46.793624][ T8380] __x64_sys_unlink+0x2c/0x30 [ 46.798274][ T8380] do_syscall_64+0x39/0x80 [ 46.802668][ T8380] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 46.808558][ T8380] RIP: 0033:0x465837 [ 46.812428][ T8380] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 46.832712][ T8380] RSP: 002b:00007fff0680e6a8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 46.841105][ T8380] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465837 [ 46.849053][ T8380] RDX: 00007fff0680e6e0 RSI: 00007fff0680e6e0 RDI: 00007fff0680e770 [ 46.857014][ T8380] RBP: 00007fff0680e770 R08: 0000000000000001 R09: 00007fff0680e540 [ 46.864958][ T8380] R10: 00000000029548c3 R11: 0000000000000206 R12: 00000000004beb5a [ 46.872922][ T8380] R13: 00007fff0680f840 R14: 0000000002954810 R15: 00007fff0680f880 [ 46.881392][ T8380] Kernel Offset: disabled [ 46.885705][ T8380] Rebooting in 86400 seconds..