(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x0, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 979.226164] Memory cgroup out of memory: Kill process 5062 (syz-executor.3) score 1113 or sacrifice child [ 979.236634] Killed process 5062 (syz-executor.3) total-vm:72712kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 979.249204] oom_reaper: reaped process 5062 (syz-executor.3), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB 01:08:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:08:34 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x0, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x8800, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x1000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 979.438074] SELinux: policydb string SE does not match my string SE Linux 01:08:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 979.503405] QAT: Invalid ioctl [ 979.506962] SELinux: failed to load policy 01:08:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:08:34 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8fd47cf9080000005345204c696e7516150000d9792794fdfffefffff820004000001600ed08691ff9a40100df77ee"], 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000000)=""/40, &(0x7f0000000040)=0x28) [ 979.545425] QAT: Invalid ioctl 01:08:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0xff0f, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0xf000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) [ 979.770343] SELinux: policydb magic number 0xf97cd48f does not match expected magic number 0xf97cff8c 01:08:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 979.894039] SELinux: failed to load policy [ 979.923469] SELinux: policydb magic number 0xf97cd48f does not match expected magic number 0xf97cff8c [ 979.991185] SELinux: failed to load policy 01:08:35 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:35 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[], 0x0) 01:08:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x1000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x11000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:08:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x541b, 0x70e000) 01:08:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x3f000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0xf000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x541b, 0x70e000) 01:08:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:35 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000002c0)) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) [ 981.076069] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 981.086357] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 981.091936] CPU: 1 PID: 13042 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 981.098875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.108776] Call Trace: [ 981.111375] dump_stack+0x172/0x1f0 [ 981.115126] warn_alloc.cold+0x7b/0x173 [ 981.119092] ? zone_watermark_ok_safe+0x260/0x260 [ 981.123925] ? lock_downgrade+0x810/0x810 [ 981.128067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.133590] ? avc_has_perm+0x404/0x610 [ 981.137562] __vmalloc_node_range+0x486/0x790 [ 981.142066] ? sel_write_load+0x1de/0x470 [ 981.146201] vmalloc+0x6b/0x90 [ 981.149391] ? sel_write_load+0x1de/0x470 [ 981.153533] sel_write_load+0x1de/0x470 [ 981.157506] __vfs_write+0x114/0x810 [ 981.161211] ? sel_make_policy_nodes+0x1520/0x1520 [ 981.166134] ? kernel_read+0x120/0x120 [ 981.170299] ? __lock_is_held+0xb6/0x140 [ 981.174380] ? rcu_read_lock_sched_held+0x110/0x130 [ 981.179398] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 981.184175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.189735] ? __sb_start_write+0x1a9/0x360 [ 981.194058] vfs_write+0x20c/0x560 [ 981.197592] ksys_write+0x14f/0x2d0 [ 981.201206] ? __ia32_sys_read+0xb0/0xb0 [ 981.205260] ? do_syscall_64+0x26/0x620 [ 981.209310] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.214661] ? do_syscall_64+0x26/0x620 [ 981.218629] __x64_sys_write+0x73/0xb0 [ 981.222507] do_syscall_64+0xfd/0x620 [ 981.226302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.231511] RIP: 0033:0x459a29 [ 981.234740] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 981.253661] RSP: 002b:00007fb2a06b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 981.261577] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 981.268843] RDX: 0000000000000000 RSI: 0000000020000680 RDI: 0000000000000003 [ 981.276283] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 981.283557] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb2a06b26d4 [ 981.290844] R13: 00000000004c9caf R14: 00000000004e1578 R15: 00000000ffffffff [ 981.298310] Mem-Info: [ 981.300756] active_anon:252601 inactive_anon:1700 isolated_anon:0 [ 981.300756] active_file:17659 inactive_file:39541 isolated_file:0 [ 981.300756] unevictable:0 dirty:34 writeback:0 unstable:0 [ 981.300756] slab_reclaimable:16940 slab_unreclaimable:116026 [ 981.300756] mapped:59245 shmem:246 pagetables:13215 bounce:0 [ 981.300756] free:1062678 free_pcp:538 free_cma:0 [ 981.334996] Node 0 active_anon:1010404kB inactive_anon:6800kB active_file:70496kB inactive_file:158164kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236980kB dirty:136kB writeback:0kB shmem:984kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 434176kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 981.363743] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 981.389724] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 981.416205] lowmem_reserve[]: 0 2555 2557 2557 [ 981.420903] Node 0 DMA32 free:450380kB min:36248kB low:45308kB high:54368kB active_anon:1010404kB inactive_anon:6800kB active_file:70496kB inactive_file:158164kB unevictable:0kB writepending:200kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:21952kB pagetables:52860kB bounce:0kB free_pcp:2136kB local_pcp:748kB free_cma:0kB [ 981.451156] lowmem_reserve[]: 0 0 2 2 [ 981.455002] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 981.481145] lowmem_reserve[]: 0 0 0 0 [ 981.485103] Node 1 Normal free:3784412kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 981.514311] lowmem_reserve[]: 0 0 0 0 [ 981.514348] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 981.535948] Node 0 DMA32: 334*4kB (UM) 1339*8kB (UME) 1460*16kB (UME) 2906*32kB (UME) 1346*64kB (UME) 317*128kB (UME) 97*256kB (UM) 44*512kB (UME) 17*1024kB (UME) 18*2048kB (UME) 23*4096kB (UM) = 450960kB [ 981.557132] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 981.568811] Node 1 Normal: 61*4kB (U) 221*8kB (U) 264*16kB (UE) 52*32kB (UME) 16*64kB (UME) 6*128kB (U) 9*256kB (UM) 4*512kB (UME) 2*1024kB (M) 2*2048kB (UE) 919*4096kB (M) = 3784412kB [ 981.585938] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 981.594889] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 981.603554] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 981.612815] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 981.621567] 57408 total pagecache pages [ 981.625543] 0 pages in swap cache [ 981.629523] Swap cache stats: add 0, delete 0, find 0/0 [ 981.634984] Free swap = 0kB [ 981.637984] Total swap = 0kB [ 981.641091] 1965979 pages RAM [ 981.644197] 0 pages HighMem/MovableOnly [ 981.648393] 338856 pages reserved [ 981.651845] 0 pages cma reserved 01:08:36 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x200, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="cc7668f7ae0bd77f3e16844994ef2b0babbefed2c24736fe8ee0b362e1ff1fa543441a74fcf7093e8eac8b65cc916176ba", 0x31, 0x6}], 0x4, &(0x7f0000000140)='/selinux/load\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x40000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x11000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x541b, 0x70e000) 01:08:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:36 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000002c0)) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x0) 01:08:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 982.011244] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) 01:08:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x3f000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x84000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x0) [ 982.115259] SELinux: failed to load policy [ 982.130123] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) 01:08:37 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) write(r0, 0x0, 0x28c) clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080080005345204c696e757a16000000d9792794fdfffefffff87f942a92a824e1992d20004000000000fd08691ff9dcee00000000101a85e7eab7d9f2517412ccb4aa7bc256b2d1de8d43683d3de3b8e4674455968a03f256fdd5695dc0592a0200019e187ef3df947fb8aca4191335ff8bf953815608000000000000007e6b205ab4825e6b0b7d9b162c4c6aa5dd3b20ab55"], 0x30) [ 982.219281] SELinux: failed to load policy 01:08:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x0) 01:08:37 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000002c0)) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x84000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x88000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 982.374494] SELinux: policydb string length 8388616 does not match expected length 8 01:08:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x0, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 982.467832] SELinux: failed to load policy 01:08:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x0, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x88000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:37 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0xff0f0000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x0, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x0, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:37 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0xff0f0000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 982.801591] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) 01:08:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x100000000000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 982.877035] SELinux: failed to load policy 01:08:37 executing program 3: write(0xffffffffffffffff, 0x0, 0x1ed) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x7d17, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x400}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e22, @rand_addr=0x7617}, @in6={0xa, 0x4e20, 0x9, @rand_addr="b8a490eb52cdcb814bcb908b5c214c89", 0xd8}, @in6={0xa, 0x4e24, 0x8, @rand_addr="ef141ee8d204f0ae8cee1cfce9ab303e", 0x1}, @in6={0xa, 0x4e23, 0x8, @rand_addr="521678ea05cbbff42d3ce377ed418d98", 0x6}], 0xa0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000000)={0xff, 0xfffffff9, 0xffffff00, 0x4, 0x7, 0xfffff801}) 01:08:37 executing program 0 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:08:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x0, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 983.063919] FAULT_INJECTION: forcing a failure. [ 983.063919] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 983.064002] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 983.125584] SELinux: failed to load policy 01:08:38 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x100000000000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 983.181493] CPU: 1 PID: 13155 Comm: syz-executor.0 Not tainted 4.19.75 #0 [ 983.188500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.197867] Call Trace: [ 983.200482] dump_stack+0x172/0x1f0 [ 983.204140] should_fail.cold+0xa/0x1b [ 983.208059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 983.213188] ? __might_sleep+0x95/0x190 [ 983.217179] __alloc_pages_nodemask+0x1ee/0x750 [ 983.222131] ? __alloc_pages_slowpath+0x2870/0x2870 [ 983.227181] ? __lock_acquire+0x6ee/0x49c0 [ 983.231437] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 983.236976] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 983.242512] alloc_pages_vma+0xdd/0x590 [ 983.246493] wp_page_copy+0x23c/0x16a0 [ 983.250379] ? pmd_pfn+0x1d0/0x1d0 [ 983.254442] ? kasan_check_read+0x11/0x20 [ 983.258578] ? do_raw_spin_unlock+0x57/0x270 [ 983.262986] do_wp_page+0x57d/0x10b0 [ 983.266696] ? finish_mkwrite_fault+0x4f0/0x4f0 [ 983.271363] ? kasan_check_write+0x14/0x20 [ 983.275585] ? do_raw_spin_lock+0xc8/0x240 [ 983.279825] __handle_mm_fault+0x2305/0x3f80 [ 983.284238] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 983.289081] ? count_memcg_event_mm+0x2b1/0x4d0 [ 983.293749] handle_mm_fault+0x1b5/0x690 [ 983.297983] __do_page_fault+0x62a/0xe90 [ 983.302041] ? vmalloc_fault+0x740/0x740 [ 983.306095] ? trace_hardirqs_off_caller+0x65/0x220 [ 983.311108] do_page_fault+0x71/0x57d [ 983.315004] page_fault+0x1e/0x30 [ 983.318447] RIP: 0010:__put_user_4+0x1c/0x30 [ 983.322851] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 983.341753] RSP: 0018:ffff88803ba4fac0 EFLAGS: 00010297 [ 983.347243] RAX: 0000000000000000 RBX: 00007fffffffeffd RCX: 000000000070e000 [ 983.354507] RDX: 000000000000009e RSI: ffffffff819452d3 RDI: 0000000000000282 [ 983.361768] RBP: ffff88803ba4fae8 R08: ffff8880a43d6380 R09: 0000000000000001 [ 983.369026] R10: ffff8880a43d6c28 R11: ffffffff89e7ed58 R12: ffff8880a8ebe3c0 [ 983.376287] R13: 0000000000000000 R14: 000000000070e000 R15: ffff8880a8ebe3c0 [ 983.383564] ? __might_fault+0x1a3/0x1e0 [ 983.389016] ? sctp_ioctl+0x123/0x1d0 [ 983.392807] ? sctp_sendmsg_check_sflags+0x270/0x270 [ 983.397908] inet6_ioctl+0xe8/0x1c0 [ 983.401530] sock_do_ioctl+0xd8/0x2f0 [ 983.405320] ? compat_ifr_data_ioctl+0x160/0x160 [ 983.412934] ? kasan_check_read+0x11/0x20 [ 983.417087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.422618] sock_ioctl+0x325/0x610 [ 983.426232] ? dlci_ioctl_set+0x40/0x40 [ 983.430197] ? file_has_perm+0x26d/0x390 [ 983.434260] ? selinux_file_open+0x4a0/0x4a0 [ 983.439447] ? __fget+0x340/0x540 [ 983.442896] ? dlci_ioctl_set+0x40/0x40 [ 983.446867] do_vfs_ioctl+0xd5f/0x1380 [ 983.450743] ? selinux_file_ioctl+0x125/0x5e0 [ 983.455238] ? ioctl_preallocate+0x210/0x210 [ 983.459644] ? selinux_file_mprotect+0x620/0x620 [ 983.464389] ? __fget+0x367/0x540 [ 983.467839] ? iterate_fd+0x360/0x360 [ 983.471639] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 983.477253] ? fput+0x128/0x1a0 [ 983.480527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.486059] ? security_file_ioctl+0x8d/0xc0 [ 983.490459] ksys_ioctl+0xab/0xd0 [ 983.493906] __x64_sys_ioctl+0x73/0xb0 [ 983.497792] do_syscall_64+0xfd/0x620 [ 983.501627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.506823] RIP: 0033:0x459a29 [ 983.510092] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:08:38 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64=0x0, @ANYRES32=r1, @ANYRES16=0x0, @ANYRES64, @ANYRESOCT=r2, @ANYRESHEX]], 0x8) 01:08:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0xf00000000000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 983.529367] RSP: 002b:00007f92f218cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 983.537095] RAX: ffffffffffffffda RBX: 00007f92f218cc90 RCX: 0000000000459a29 [ 983.544361] RDX: 000000000070e000 RSI: 000000000000541b RDI: 0000000000000005 [ 983.551624] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 983.558898] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f92f218d6d4 [ 983.566162] R13: 00000000004c41ce R14: 00000000004d84b8 R15: 0000000000000006 01:08:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x0, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 983.664433] syz-executor.3 invoked oom-killer: gfp_mask=0x6201ca(GFP_HIGHUSER_MOVABLE|__GFP_WRITE), nodemask=(null), order=0, oom_score_adj=1000 [ 983.695108] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 983.703056] CPU: 0 PID: 13161 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 983.710019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.710100] Call Trace: [ 983.710121] dump_stack+0x172/0x1f0 [ 983.710141] dump_header+0x15e/0xa55 [ 983.710161] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 983.734556] ? ___ratelimit+0x60/0x595 [ 983.738454] ? do_raw_spin_unlock+0x57/0x270 [ 983.738474] oom_kill_process.cold+0x10/0x6ef [ 983.738491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.738503] ? task_will_free_mem+0x139/0x6e0 [ 983.738517] ? find_held_lock+0x35/0x130 [ 983.738533] out_of_memory+0x936/0x12d0 [ 983.738547] ? lock_downgrade+0x810/0x810 [ 983.738564] ? oom_killer_disable+0x280/0x280 [ 983.738575] ? find_held_lock+0x35/0x130 [ 983.738598] mem_cgroup_out_of_memory+0x1d2/0x240 [ 983.738612] ? memcg_event_wake+0x230/0x230 [ 983.738629] ? do_raw_spin_unlock+0x57/0x270 [ 983.738644] ? _raw_spin_unlock+0x2d/0x50 [ 983.738657] try_charge+0xef7/0x1480 [ 983.738668] ? find_held_lock+0x35/0x130 [ 983.738685] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 983.738703] ? kasan_check_read+0x11/0x20 01:08:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x0, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 983.738720] ? get_mem_cgroup_from_mm+0x156/0x320 [ 983.738737] mem_cgroup_try_charge+0x259/0x6b0 [ 983.738756] __add_to_page_cache_locked+0x334/0xc20 [ 983.738772] ? find_lock_entry+0x510/0x510 [ 983.738792] add_to_page_cache_lru+0x1c9/0x860 [ 983.738806] ? add_to_page_cache_locked+0x40/0x40 [ 983.738819] ? __page_cache_alloc+0x131/0x450 [ 983.738834] pagecache_get_page+0x364/0xa40 [ 983.738850] grab_cache_page_write_begin+0x7b/0xb0 [ 983.738869] ext4_da_write_begin+0x2d7/0xec0 [ 983.860108] ? iov_iter_fault_in_readable+0x377/0x450 [ 983.865325] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.870908] ? ext4_write_begin+0x1470/0x1470 [ 983.875410] ? copy_page_from_iter+0x7f0/0x7f0 [ 983.875434] generic_perform_write+0x22a/0x520 [ 983.875454] ? page_endio+0x780/0x780 [ 983.888424] ? current_time+0x140/0x140 [ 983.888440] ? lock_acquire+0x16f/0x3f0 [ 983.888455] ? ext4_file_write_iter+0x23f/0x1060 [ 983.888474] __generic_file_write_iter+0x25e/0x630 [ 983.888492] ext4_file_write_iter+0x32b/0x1060 [ 983.888512] ? ext4_file_mmap+0x410/0x410 [ 983.888525] ? mark_held_locks+0x100/0x100 [ 983.888543] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.888560] ? iov_iter_init+0xc6/0x1f0 [ 983.929358] __vfs_write+0x587/0x810 [ 983.933408] ? kernel_read+0x120/0x120 [ 983.937371] ? rcu_read_lock_sched_held+0x110/0x130 [ 983.942423] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 983.947235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.952899] ? __sb_start_write+0x1a9/0x360 [ 983.957249] vfs_write+0x20c/0x560 [ 983.960824] ksys_write+0x14f/0x2d0 01:08:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x1100000000000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 983.964465] ? __ia32_sys_read+0xb0/0xb0 [ 983.968546] ? do_syscall_64+0x26/0x620 [ 983.972538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.977912] ? do_syscall_64+0x26/0x620 [ 983.982060] __x64_sys_write+0x73/0xb0 [ 983.982079] do_syscall_64+0xfd/0x620 [ 983.982098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.982108] RIP: 0033:0x459a29 [ 983.982125] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.982131] RSP: 002b:00007fb2a06d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 983.982144] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 983.982151] RDX: 000000002001007f RSI: 0000000020000080 RDI: 0000000000000003 [ 983.982157] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 983.982163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb2a06d36d4 [ 983.982170] R13: 00000000004c9baa R14: 00000000004e13f8 R15: 00000000ffffffff 01:08:39 executing program 0 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:08:39 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0xf00000000000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 984.021605] Task in /syz3 killed as a result of limit of /syz3 [ 984.074483] memory: usage 307200kB, limit 307200kB, failcnt 10141 [ 984.087626] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 984.124377] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 984.143886] Memory cgroup stats for /syz3: cache:264KB rss:211160KB rss_huge:165888KB shmem:48KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:211268KB inactive_file:228KB active_file:0KB unevictable:0KB 01:08:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x0, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) [ 984.198711] Memory cgroup out of memory: Kill process 5302 (syz-executor.3) score 1113 or sacrifice child 01:08:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x3f00000000000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 984.249366] Killed process 5302 (syz-executor.3) total-vm:72712kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB 01:08:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x1100000000000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:39 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x4000000000000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x2, 0x70e000) 01:08:39 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:39 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x3f00000000000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 984.914012] SELinux: policydb magic number 0x20000040 does not match expected magic number 0xf97cff8c [ 984.925807] SELinux: failed to load policy 01:08:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x4b47, 0x70e000) 01:08:39 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) r1 = getgid() setgid(r1) [ 985.032818] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 985.059965] SELinux: failed to load policy 01:08:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x4b49, 0x70e000) 01:08:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x8400000000000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x8400000000000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 985.227438] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 985.309960] SELinux: failed to load policy 01:08:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x5421, 0x70e000) 01:08:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:40 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101002, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0x9, 0x8a64, 0x100}) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc01008f0731"], 0x30) [ 985.347138] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 985.374895] SELinux: failed to load policy 01:08:40 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x8800000000000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x8800000000000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 985.536049] SELinux: ebitmap: truncated map [ 985.585879] SELinux: failed to load policy 01:08:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x5450, 0x70e000) 01:08:40 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) accept4(r1, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r12) r13 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r13, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x3, 0x0}}, 0x1c) listen(r13, 0x5eb857) accept4(r13, 0x0, 0x0, 0x0) fstat(r13, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000340), &(0x7f0000000380)) keyctl$chown(0x4, 0x0, 0x0, r17) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000340)={{}, {0x1, 0x7}, [{0x2, 0x4, r3}, {0x2, 0x3, r4}, {0x2, 0x6, r6}, {0x2, 0x4, r8}, {0x2, 0x8, r10}, {0x2, 0x1, r12}, {0x2, 0x6, r14}, {0x2, 0x7, 0xee00}, {0x2, 0x23e4367af089c0f1, r15}], {}, [{0x8, 0x4, r16}, {0x8, 0x0, r17}], {}, {0x20, 0x2}}, 0x7c, 0x2) 01:08:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0xff0f000000000000, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0xff0f000000000000, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 985.815484] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 985.845297] SELinux: failed to load policy 01:08:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x5451, 0x70e000) 01:08:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:41 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x5452, 0x70e000) 01:08:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x2, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x2, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x5460, 0x70e000) 01:08:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:41 executing program 3: write(0xffffffffffffffff, 0x0, 0x16) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x105080, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYPTR], 0x8) r1 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0xffffffff, 0x202200) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f00000000c0)={0x2, 0x0, 0x1009, 0x80, 0x9, {0x9, 0x26a}, 0x2}) 01:08:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x3, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8901, 0x70e000) 01:08:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x3, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:41 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) [ 986.613506] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 986.623718] SELinux: failed to load policy 01:08:41 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) accept4(r0, 0x0, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) perf_event_open(&(0x7f00000000c0)={0xfe19a71e88eed1b9, 0x70, 0x0, 0x81, 0x1, 0x4, 0x0, 0x1, 0x2018, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x2508, 0x1, 0x9afc, 0x1, 0x99d1, 0xffffffff, 0x8001}, r1, 0xa, r2, 0x8) clone(0x20010300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8902, 0x70e000) 01:08:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8903, 0x70e000) 01:08:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x4, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x4, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 986.947469] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) 01:08:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 987.000116] SELinux: failed to load policy 01:08:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8904, 0x70e000) 01:08:42 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(0x0, 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x6, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8906, 0x70e000) 01:08:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:42 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(0x0, 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x6, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8907, 0x70e000) 01:08:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x7, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x890b, 0x70e000) 01:08:42 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000400)=[{{0x0, 0x0, 0x0, 0x9eb27459e3cdb250}}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000000c00), 0x4000000000001e6, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r2, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000000c0)={r2, 0x9a, "da1884063723f27b86615405f5b42f6027490fafaeaa0405d06306c48c8d73682f8a29c0f7bb4bff5d625fd2865521b7815781b72fb33e91b4f0ccfd83c07bb5f708314b60d523644bf6d29e543a8b54577b289180e0467897685521f5e3334797048f3d1701dd3cf16072a0d4ede922d8ddae3565df1da30cd6d971e38b797082e7295763788f5977fc5e9f9e69d798e27e2c7b663e7edf08ba"}, &(0x7f0000000040)=0xa2) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r3, 0x5eb857) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r4, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r5 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r5, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r5, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r6, 0x5eb857) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg(r7, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r7, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r8 = accept4(r7, 0x0, 0x0, 0x140c00) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r9, &(0x7f0000000080), 0x2001007f) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000e40)=0xe8) sendmmsg(r8, &(0x7f0000004dc0)=[{{&(0x7f0000000200)=@pppoe={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000280)="34b7e5667557fc666a29aef5a7a9c98bf03c638dbd69dd783db56efa685f652a33beb4c983131d403b91c449dbb79e90030e57707bde2c0ca05c68dad60fa8d8111df3eac7547ccf8a10276c9aeb71769baa679f8c9224ae62a7b4a81f06f78f0fb742fcc0539ce69416e511f9592afd32ab1b4d9985775719f2419e5df2e69838ce6c4b28561394b3d4c449758042d012423a43655c85b38d9c31299d0dedbf010f6d07dba65f0fbb45ad1ab5f4c5f324deea8ebb72b90efc21425c989f491f268aea8bcf5222836b2c2a2674535db42339dac627062911a64ad7abc1cd36ad4e616936df", 0xe5}, {&(0x7f0000000440)="f8927399011751eeb31d081c50392d65eec7e4ec86e25a2e7c005d28ce351a412d321dfd601a55de0e7b4b9f22e3eef7c4417f1bcc3867507a65e800b5a7593fcedb29c664652b4f91f71820a0a4b0c6bbf0fc79ca27e84244c2fb6291c4609c944c147efd16329e8f7f54108b83d24e48eacbaa2624cee82d7729895c98b7f31f7705d530fc28218d05de1fb8238c3ef8", 0x91}, {&(0x7f0000000380)="8a09ab6b27269ad66ca24a1c63a6f25e7c9f697137b71efaf4", 0x19}, {&(0x7f00000003c0)="2e8eec48", 0x4}, {&(0x7f0000000500)="354b99a38e495b10b513b5e641d94bb7f2c5d27274cc6733d278ead0d6daadaf11f282404a6141c7dbc57e78c413c85387b1db7ab68853139d3862355c72d52980186e30ad657c41b466fec6ff3d41ad7d26e5cabf58d47c26d98f9702d618182f2aa57e7abd24271688c6a49221ebc177d188d7379ab1c194b2af194655c392e4378678a93fc04cc58fa7bfab973376e5308220a88c5adee50eddaa3db93bcd0d1a08", 0xa3}, {&(0x7f00000005c0)="fd625df9ac644f9064afaa8853bd2b5eeb0faa1a3914a55afcfc675675e5c96887e93d77f6df7253", 0x28}, {&(0x7f00000006c0)="259004e6f23911f4a88d716d3495275bdf42ce6233d564c8cfbdb56ed1299aaf797f9615b499aeea79cb81c96e25787a8f2aa1e64e7185831456fa8734c0233fdfb33930216d09735cc75e0547d1dbc6aa07ce33c7684ec7e95dfcc93005aae2bc0ecfdacfd999e0cd071cd6b6fa608c551d26a20d9be7c771fdacaadcb4a53cc253b29509eb2fce519728630c2a01af8c93eda566b8e3376c86aa4cf69c0b3c0d15343aec76332437cb233d316a0be802bb13a78abd342cc0ddd68d9ab2", 0xffffffffffffff40}, {&(0x7f0000000600)="114d9faf68d1f30f67538178cee0c4479ab9ff407fecd6788277ab540b29", 0x1e}], 0x8, &(0x7f0000004f00)=ANY=[@ANYBLOB="780000000000000003030000000000f0782d3cdc373675bfafdb0ae2a11507ad567eae7ef612acaaba4029230d90b98e4c79dfcfd254d6d35fe4b953f7626f07e49b1fb8cc368075e128da153542368e4a7ee0a0c308f9e33b2d6a20bfce6de00021ab02a950b6093c95c9ff0000000078000000000000000b01000002000000cb8827875653a746337d7786d2db70d20956e43c7c19f5fc87c06599761f6c974374171b5806a016555e45fb5780eaf1d566e2fbf11aa0428437d802afc41dc681ff07ba0c9a8b5b223c5d85faa6adfebe4e5f957bb451f8a2b08f360585f2bcc37c719bfa9d5a6d60000000000000000501000004000000bfb21bf01d37f2d56690c3254b07aa115a11d3bca5c5660f844dc36c3a5427a99de1b1726bec17c870bbd7f36363b4821e173d230cdfecf57e8b38519412915a4b54c8fa1b0e553ea1a9df20a0700000900000000000000015010000090000000f0d11a16dffc18f088a6d694195cc1d1cc7e44664f4312fa13f13e9bf507c4a33a57bdc071a7ddeada4b4535e37c44d52cd0ab65ccfd1232accd2aa99eb5b5cba1c7703e9eb49af6d8aea519f6c99d52b046fc80889d4bfee9afcc2e55b668cde8ab46c4fe57abc7abfc9a40f9700000000000000e80000000000000002010000020000008a8ac7ce5033cf225a6274b91e058d8aa5896a0c8e282f6e15941f00bf874631661147dae91f7e37e264cc6a3ca015fe08fff5e5d7e3c89d4abf6ece1a3973bac4d5d89b98b6c0c9b7f4114c115c7beacea947695be38a58e497a3b73a06a225e2db651fc829a8d47250cdbcc283193db107b224defafabd99ee2b75a8bf1a77c0e5e80b6543f69c0044aa09342564193a239822e61c53dfd0ba657366084eb276720fdaaebb02b741259b87b3bff25556e6eabb93e65bfa3302dc2dd7f9fd0e5185e5dc71747e7b48ba9ddc0b33a33108e31fca00000000cd099fe3d148858f7da466b770a35f62634d3992081b9b31c63072f7d2996ea3187811d7766e25d2b186d0315d19f313a9dda3726733790f4315ba926207ea467c80f0584ed4a8c6b52f6cd2b819c6cfe0055d8533937ee87c288f1beba2a10e048f5ed634d3cae81eff34f424b0f9d936337e914dce8058089c1f9f337e962612f3bbae0dd1f6de3d1dafd3c81d281327b7f8794674d600"/855], 0x357}}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000b00)="d4443a6982031a4bfc5f32c846ae0a6d3afd1287697583f694e0fe12c5874cacf8946c70917c65cb76d2e0a461dcca24785da6714090c7f35650f5d78923caa095f130a4d868fa7792c1f1caa54964111cdf6559fd669efe54bcf2057885d7f8b92ab037f896e8fad55cc7d3d5e23d8d44a6a71de837d88a57d8a352c35b5413164ea996562297cd6895c9f15f3faadd3a5447710c27189f9fe2906424452ee0e0c3f60ce6dc70422c00e39016ebdbd1e001dc38833fc3c78ffa657616b342c5aab98e82e8d1538e4a42c0c8cec54bbcd22ee321e04215da2692", 0xda}, {&(0x7f0000000640)}, {&(0x7f0000000c00)}], 0x3, &(0x7f0000000c80)=[{0xc0, 0x119, 0x9, "551642571bcf80d81dafc23128928e88ebacd07817eb1944449f08a5aed397765b818ea7f160014dc8670e7d2b0171dc2f6d5aea8531b803457d9d74738da2c619e5837045e7c081ed3d34ab31c20f743ca9d5dbd52d78956a5c999ef03b5034443f41a47fdd795445f3e5c8322d8aa0d04dd3da25683a18eb009ac13917589156108c6509102af47256b19ee4f3cb3cd070399627e3c7f172c2a059a70b72741dbdc9cc34543720fbab02d9f7be"}], 0xc0}}, {{&(0x7f0000000e80)=@xdp={0x2c, 0x2, r10, 0x2a}, 0x80, &(0x7f00000042c0)=[{&(0x7f0000000f00)="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", 0x1000}, {&(0x7f0000001f00)="17a131491ef3a33396244bc164e17986d6ed3f270aab0b5d60", 0x19}, {&(0x7f0000001f40)="5923a3af195453eaa62b431275fd4fb26de48455e012de6d1d973b6c53072e59ba2eca24fe8bcac50de0c2523cdf792e8cc3bc9cdabd9546ee3c8b80ccef05892970e086f896cf6d9ae34582fa898dac06122803156062921e353563a137719acd2460ac2dac190c711bcdc03c69c37e2b31f7c5b61f38e4782044b9eb81c6288835e8caef0593159965e1f2a2268a5e6e302a6eab573bcf7df87bba93ec9b36e40c854c158b4135b2ff1ae844753d4b9edbb2718a34431cd29c103d6dae1dfb9f385c68a9d7bacf37", 0xc9}, {&(0x7f0000002040)="1c044f56273978ca784fa9fc223d56f83eb39ae6a7e35b528f56e7f449763eb434a3137f7248cba59031e85ada1d2ba33bdd6a5e44a05b0ccf2312b0b5b2f048a8d645e8ae0e8f47afc09643e87b4904c5795ea5fff2803c1d465dc2eccf26f0d373cf5bc2bfd1b07eb5430d8fedb2626534ebc9468022e16aa5f6fe84eb8a2e37e7493ef8df113d93531f55f8b6ebb67df593d6f6fecd136f23af12a4d2ff1acb5a997cef13fd2f96222206b5da807ca0d4790f70e9ed25b67037ad12461f", 0xbf}, {&(0x7f0000002100)="9d0ffee9632bebbcfada8cc269a045812acaa3eb11197ef04ec158442a5324bdd47f851c885e78b445bc60f0f52a114532eea41b3116e91a86eedc21455721687ed4f10fdc97ed6dd4c4015a558d62eabbc01007d6cb5db60c5316c87ed05a8fa7f8a9862578b0cb571e4103038fa56634ba51ba1a48cc5ccd27b7ef928aeb501580", 0x82}, {&(0x7f00000021c0)="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", 0x1000}, {&(0x7f00000031c0)="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", 0x1000}, {&(0x7f00000041c0)="cb128ececf3e38c79ec57d223d0aa6911a20872a5586e2bd7314e9007ae033302cb47f03d339c79093685eb1dac85ca0978bbd7e26cb044952777b1ca0c052a2fd2322fbc9931a0f0bca1f993d180a25688c55a5d8537afd6d78253d77675f139348ae38352d9e6c23484747ace1d36c58ebc90d5d79aba8b4127a4bf8400b3dcc958416faab0793e6258d86972473eeea9d7fe84e0b7c3f08f29f18c2564296a5599880f6851a6c1de0f0bdad54775748f51f08ca68ef55230383d1fba0ccea65d0593e3f6998bfc3ae2b7f9ed1da75c3b58fb7d3432377cfbbd20149d2a90ed8a860b96fa810811d77a84b271469e98f39a7e948ff6a0d", 0xf8}], 0x8, &(0x7f0000004340)=[{0x20, 0x114, 0x5, "0b2a864782f7c465be02"}], 0x20}}, {{&(0x7f0000000940)=@caif=@rfm={0x25, 0x7f, "e777222f8cc4c485200d6f9160a0dcfa"}, 0x80, &(0x7f0000004680)=[{&(0x7f0000004400)="4166a9571f5c4c2804bf30b27c2a8a0f6027cf312f521875684505c4b40302fe86452374ba1b029f4be10573b8e9fe0e7c2ba375862990785fea7be569f830807cec40053ee425196288464dfc02e2b745d785f194e2dfefae06a2188c2d4707fa1a734634e86f650cf5b787f09dbb76f3d156ec24650fcc2ebe447762705eb6ad394f5a41c6cec7c2e83d2de0333c7b36ecd088f508765ef460dfe9d55e", 0x9e}, {&(0x7f00000044c0)="71dad235fc89fd51cc9be3e8033ac8d914dc908a9764cd81565fe961499db598602e40befa8c59c1ab0c664d9ede953d4c1976a37ba924af18df85c5d50c50b3d50182439a05a7ccbcf0b3dacac516e6935b8bad2371596d0879c58e8462f8b8d58620b4a4b219a07faf2a4f09d676ed4918c2a0d1c230419434187cef3853702af7532ad3f6c2d549550cf0adce148d551461ac82b9c71c6d1e101949031f95a7812958439da5625f645b199924e4ff7fc079cdcf788d7814620ea99c9a6e74c4fd50f6dd35566acaa7636a2f2a6b29f6e3066043f43984a532cf91160647cb", 0xe0}, {&(0x7f00000045c0)="6621d388f26b35abd77504a664e56f7cf9ade9170f0a951e004d8b2745434949339ebc88d9405920f4132a45c1f66b85d9c8e3af8ad864c056d6eed848c162e70dc9a0576c9918b52cf8eef74d1856b35a2a186d4a7e5960dda5e6d4b445168265f89fada880137f51af3addaaf2156b1a035db3d34c5bc18d508d7aa59d669faf25f32c2c6f524b6f9d5d0a5871442e3135c229c1eca7c49439990f1ed792182dadfc6d218b08364d", 0xa9}], 0x3, &(0x7f0000005280)=ANY=[@ANYBLOB="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"], 0x160}}, {{&(0x7f0000004840)=@nl=@kern={0x10, 0x0, 0x0, 0x2240020}, 0x80, &(0x7f0000004a80)=[{&(0x7f00000048c0)="ae1721db2affad399a3234bdb0ba2af39967746f9cfc91d7c96937c8ecf500541fb97edaab3f600264012dba527895fc1b2bbb6269f83536dfc31578a6441b443c9de26282b195d611f26b6359187b534715a820a5883a4a5ce8f02a311381a1186c45634001e5eaa5ac871f4165600acf01ab476431d468a85efd0847ae11b90a9f124b548c88e42f861ab3a06028f06a3abbd76b5f0e9c4184ac84059f0ec13b0b2d412ad9022e2e30994947841c72bab42e32847a2c9a80617e4637e5659755677cfa37", 0xc5}, {&(0x7f00000049c0)="6cdada6c4e617e5774c6511069056b2893768177a09b00e3986cb1f575c43165f61b1cb35550fd417c9824ad066dc419b70e2e8c1e71e5599115d01c138bc296068b240492fb4685be7996afa8f84002cfcd7c0b8594d5f282325118ad1e5924e738246f2d389fd733f5d37656f8e727e09d36d9b4e9bc8a2abe3a0f000568c49245304429579286e25e00c5a29d3cadc1cb", 0x92}], 0x2, &(0x7f0000004ac0)=[{0x100, 0x103, 0xb166, "e6aac5b86d4f7a8b0dafdf563d7cc6908bf03f3096e8fc1439b2f3ae2d4ef59a182da7e34e5878e8403af8cee9398c9866954bffd676b75851a681101f17670f5b20363b8159b5341f1c8061ae68c24aba660809e97f459086c7930296845e626a6185692ae1bd0b7daab79a63d531a2f3d2dce3ac49abda4484ed91c4dd2884d36d0b23b2e6c12a40794a92845a588eeb89b1884b761070f6588d6ed5e7c36869ffa05b31d22e9929034a360f20e560dfe582d05db2dbb66fac7f3f47e6ea63be9a23fe116eb57e545d6b50e007017e5694dc9c0b4ee48e1faf677aa96baf0ebef5d97753aa2b580b37e7f7e5449b"}, {0xd8, 0x29, 0x2, "50d7d6e0f588344a11bf21f2f88aa93fe4efbff420c7dcdcab19d826cd54374c10e1bb3eaa80e204863c4bc2a45e7e32e72a8df1646d415d49eb1fec3bdb6bf2cfcfe0dca4f0f17f119f46eb1fd7fdd9e0cc6c070891406ea1d754ee9f197421026b065bf0e18c20c712d8eb2a8cf4b79cfbaaf58167a919733e74c9f4085f09339cc9eaefe54353facc4ee6048345a49389d34989ac89727bcd5fbe1403551a7c79c0b4f4a2d56fa52343ffa543f5708528ee3665099f4e6437b0984e29d05537dca2e9fa"}, {0xe8, 0x101, 0x9c04, "be6761045a9b07967d1fabf3198ed046fb24b4d3a6911d19a47291958c748131b79a3c2c2fda3309697a476c97f97efe71689f0cad46b4dbba34b3e3230653a7a45c000dc81f034153441138c89809d6f81890f5147b824ccefa43ab2f3437c258758335cbc110660afcb35e849aacbcd322a89799efcfce7eed017e092e7d90ab5f34d7bd079c2361f8622a15d06ab56cf7ee3c05270e27cf79adc954783fe7cceb7bd2cc505dfbd5ff643fe865ca4a9f90999551fdc297edb1354358d71cd55683567a8e53d143053f5629c7b4b2a13a58"}, {0x30, 0x0, 0x7, "d57b2be283ffae08de798fa2888f2b0a88721bac4d99d06b24b88e196ea4cbd4"}], 0x2f0}}], 0x5, 0x0) sendmmsg(r8, &(0x7f0000000c00), 0x4000000000001e6, 0x0) bind$rxrpc(r8, &(0x7f0000000000)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e22, 0x10001, @mcast1}}, 0x24) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000180)=""/118) write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r11 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r12 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r12, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r12, 0x5eb857) accept4(r12, 0x0, 0x0, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000800)=0xc) wait4(r13, &(0x7f0000000840), 0x1, &(0x7f0000000880)) write$selinux_load(r11, &(0x7f0000000680)=ANY=[@ANYPTR64], 0x39a) 01:08:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:42 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x8, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x7, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x890c, 0x70e000) 01:08:43 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(0x0, 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8916, 0x70e000) 01:08:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x9, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x8, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8918, 0x70e000) 01:08:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x0, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8936, 0x70e000) 01:08:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xa, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x9, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:43 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8940, 0x70e000) 01:08:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x0, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:43 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:getty_exec_t:s0\x00', 0x22, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @my=0x0}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x78}, 0x4000010) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in=@dev={0xac, 0x14, 0x14, 0x1f}, 0x4e24, 0x3, 0x4e21, 0x2, 0x2, 0xa0, 0x20, 0x67, 0x0, r4}, {0x2, 0xf6, 0x7, 0x3ff, 0x10001, 0x2, 0xfffffffffffffffd, 0x2}, {0x6, 0x4, 0x3ff, 0x40}, 0x101, 0x6e6bb7, 0x0, 0x1, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d5, 0x3c}, 0xdff2df24b03f4533, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x1, 0x3, 0x1, 0x4, 0x9, 0x3}}, 0xe8) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000000)=0x80) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r6, 0x5eb857) accept4(r6, 0x0, 0x0, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/enforce\x00', 0x8000, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r7, 0x1, 0x1, &(0x7f0000000540)={0x8}, 0x4) write$selinux_load(r5, &(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f00000004c0)=ANY=[]], 0xffffffffffffff02) r8 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r8, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000580)=""/248) sendmsg$sock(r8, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680)={0x0}, &(0x7f00000006c0)=0xc) setpriority(0x3, r9, 0x6) syncfs(r8) 01:08:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xb, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xa, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8941, 0x70e000) 01:08:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x0, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x894c, 0x70e000) 01:08:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:44 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xb, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xc, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8980, 0x70e000) 01:08:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 989.788659] syz-executor.3 invoked oom-killer: gfp_mask=0x6201ca(GFP_HIGHUSER_MOVABLE|__GFP_WRITE), nodemask=(null), order=0, oom_score_adj=1000 [ 989.812039] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 989.822853] CPU: 1 PID: 13552 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 989.830020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.839539] Call Trace: [ 989.842134] dump_stack+0x172/0x1f0 [ 989.845947] dump_header+0x15e/0xa55 [ 989.849789] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 989.854929] ? ___ratelimit+0x60/0x595 [ 989.859096] ? do_raw_spin_unlock+0x57/0x270 [ 989.863511] oom_kill_process.cold+0x10/0x6ef [ 989.868010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.873645] ? task_will_free_mem+0x139/0x6e0 [ 989.879276] ? find_held_lock+0x35/0x130 [ 989.883420] out_of_memory+0x936/0x12d0 [ 989.888621] ? lock_downgrade+0x810/0x810 [ 989.893030] ? oom_killer_disable+0x280/0x280 [ 989.897529] ? find_held_lock+0x35/0x130 [ 989.901592] mem_cgroup_out_of_memory+0x1d2/0x240 [ 989.906534] ? memcg_event_wake+0x230/0x230 [ 989.910854] ? do_raw_spin_unlock+0x57/0x270 [ 989.915438] ? _raw_spin_unlock+0x2d/0x50 [ 989.919586] try_charge+0xef7/0x1480 [ 989.923491] ? find_held_lock+0x35/0x130 [ 989.927553] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 989.933717] ? kasan_check_read+0x11/0x20 [ 989.937883] ? get_mem_cgroup_from_mm+0x156/0x320 [ 989.942727] mem_cgroup_try_charge+0x259/0x6b0 [ 989.947319] __add_to_page_cache_locked+0x334/0xc20 [ 989.952603] ? find_lock_entry+0x510/0x510 [ 989.956857] add_to_page_cache_lru+0x1c9/0x860 [ 989.961440] ? add_to_page_cache_locked+0x40/0x40 [ 989.966294] ? __page_cache_alloc+0x131/0x450 [ 989.970807] pagecache_get_page+0x364/0xa40 [ 989.979131] grab_cache_page_write_begin+0x7b/0xb0 [ 989.984087] ext4_da_write_begin+0x2d7/0xec0 [ 989.990152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 989.997775] ? ext4_write_begin+0x1470/0x1470 [ 990.002269] ? copy_page_from_iter+0x7f0/0x7f0 [ 990.009202] generic_perform_write+0x22a/0x520 [ 990.013789] ? page_endio+0x780/0x780 [ 990.020452] ? current_time+0x140/0x140 [ 990.024429] ? lock_acquire+0x16f/0x3f0 [ 990.028404] ? ext4_file_write_iter+0x23f/0x1060 [ 990.033258] __generic_file_write_iter+0x25e/0x630 [ 990.038541] ext4_file_write_iter+0x32b/0x1060 [ 990.044091] ? mark_held_locks+0x100/0x100 [ 990.048328] ? ext4_file_mmap+0x410/0x410 [ 990.053110] ? mark_held_locks+0x100/0x100 [ 990.057498] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 990.063728] ? iov_iter_init+0xc6/0x1f0 [ 990.067795] __vfs_write+0x587/0x810 [ 990.074918] ? kernel_read+0x120/0x120 [ 990.079615] ? rcu_read_lock_sched_held+0x110/0x130 [ 990.084630] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 990.089494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.095031] ? __sb_start_write+0x1a9/0x360 [ 990.099444] vfs_write+0x20c/0x560 [ 990.102984] ksys_write+0x14f/0x2d0 [ 990.106785] ? __ia32_sys_read+0xb0/0xb0 [ 990.110850] ? do_syscall_64+0x26/0x620 [ 990.115716] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 990.121259] ? do_syscall_64+0x26/0x620 [ 990.125237] __x64_sys_write+0x73/0xb0 [ 990.129300] do_syscall_64+0xfd/0x620 [ 990.133106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 990.138915] RIP: 0033:0x459a29 [ 990.142109] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 990.161625] RSP: 002b:00007fb2a06d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 990.169416] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 990.176690] RDX: 000000002001007f RSI: 0000000020000080 RDI: 0000000000000004 [ 990.185088] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 990.192441] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb2a06d36d4 [ 990.199967] R13: 00000000004c9baa R14: 00000000004e13f8 R15: 00000000ffffffff [ 990.218272] Task in /syz3 killed as a result of limit of /syz3 [ 990.224730] memory: usage 306960kB, limit 307200kB, failcnt 13861 [ 990.231586] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 990.238474] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 990.244988] Memory cgroup stats for /syz3: cache:68KB rss:209772KB rss_huge:163840KB shmem:48KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:209992KB inactive_file:52KB active_file:4KB unevictable:0KB [ 990.267076] Memory cgroup out of memory: Kill process 6238 (syz-executor.3) score 1113 or sacrifice child 01:08:45 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x140000, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES16]], 0x8) 01:08:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xd, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8981, 0x70e000) 01:08:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xc, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:45 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 990.289206] Killed process 6238 (syz-executor.3) total-vm:72712kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 990.302493] oom_reaper: reaped process 6238 (syz-executor.3), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB 01:08:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8982, 0x70e000) 01:08:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x0, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 990.456564] SELinux: policydb magic number 0x20000040 does not match expected magic number 0xf97cff8c [ 990.486735] SELinux: failed to load policy 01:08:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xe, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xd, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x8983, 0x70e000) [ 990.534689] SELinux: policydb magic number 0x20000040 does not match expected magic number 0xf97cff8c [ 990.581905] SELinux: failed to load policy 01:08:45 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x0, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x89a0, 0x70e000) 01:08:45 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x0, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 990.764862] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) 01:08:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xf, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 990.838561] SELinux: failed to load policy 01:08:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x89a1, 0x70e000) 01:08:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xe, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:45 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816ff0000d9792794fdfffefffff820000100000000ed08691ff96906000077eea80c466b71a331815d30095a46a24cc93b6c822068a9f6a4e720ca16fd610ef4784b06318709000000c38529ec822473c85aca05e8938ef1c0ea4580"], 0x6c) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0xee8ea8269b11595a}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000280)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r2, 0xffffffff}}, 0x18) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000002c0)) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x8001, 0x222002) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x6) 01:08:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x0, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 991.038481] SELinux: policydb version 65302 does not match my version range 15-31 [ 991.075686] SELinux: failed to load policy 01:08:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x12, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x40049409, 0x70e000) 01:08:46 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792796fdfffe0000ed08691ff9dc0100df77eecb7f34409a8b93130d1840ffe8db3b664b03323ca457609a36d4394e42ff88bd2dfee45a542ba4"], 0x30) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@l2, &(0x7f00000000c0)=0x80) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000100)={'syzkaller0\x00', {0x2, 0x4e23, @loopback}}) [ 991.090649] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 991.121923] SELinux: failed to load policy 01:08:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0xf, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:46 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x0, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x40086602, 0x70e000) 01:08:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x13, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 991.351241] SELinux: ebitmap: map size 31258911 does not match my size 64 (high bit was -294134016) 01:08:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x0, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 991.419654] SELinux: failed to load policy 01:08:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x12, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 991.477447] SELinux: ebitmap: map size 31258911 does not match my size 64 (high bit was -294134016) 01:08:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x40087602, 0x70e000) [ 991.537874] SELinux: failed to load policy 01:08:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x14, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:46 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000006b080000696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:46 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8c16000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee00"/48], 0x30) 01:08:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x4020940d, 0x70e000) [ 991.720381] SELinux: policydb string k does not match my string SE Linux [ 991.737668] SELinux: failed to load policy 01:08:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x0, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:46 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x13, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x80086601, 0x70e000) 01:08:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x15, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x80087601, 0x70e000) [ 991.996188] SELinux: policydb magic number 0x168c does not match expected magic number 0xf97cff8c [ 992.015890] SELinux: failed to load policy 01:08:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x0, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:47 executing program 3: write(0xffffffffffffffff, 0x0, 0xfffffffffffffd54) clone(0xc4013b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x30) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f00000003c0)) fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='trusted.overlay.impure\x00', &(0x7f0000000380)='-proc\x00', 0x6, 0x2) accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000300)=@ccm_128={{0x303}, "8de3645d3c2e3e11", "0e181c5647f386257ebab4f84ed94f9b", "ef6c62cc", "6bdc4d556ccec3ab"}, 0xff4c) pselect6(0x40, &(0x7f0000000000)={0x6, 0x80, 0x7, 0x0, 0x7fffffff, 0x9, 0xec5}, &(0x7f0000000340)={0x1, 0x270ad253, 0x1000, 0xfffffffffffffffe, 0x8000, 0x2, 0x103}, &(0x7f00000000c0)={0xe2ff, 0x0, 0x7f, 0x471b, 0x3, 0x100000401, 0x0, 0xfffffffffffff552}, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000180)={&(0x7f0000000140)={0x80000000}, 0x8}) 01:08:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0xc0045878, 0x70e000) 01:08:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x16, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x14, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 992.219045] IPVS: ftp: loaded support on port[0] = 21 01:08:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0xc0045878, 0x70e000) 01:08:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x0, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:47 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0xc0189436, 0x70e000) 01:08:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x17, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:47 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x24802, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e21, @remote}], 0x10) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r4, 0x5eb857) accept4(r4, 0x0, 0x0, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4625, 0x0, @remote}, 0x1c) listen(r3, 0x5eb857) r5 = accept4(r3, 0x0, 0x0, 0x0) sched_yield() sendmmsg(r5, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000040)=0x6) sendmmsg(r5, &(0x7f0000000c00), 0x4000000000001e6, 0x0) write$selinux_load(r2, &(0x7f00000000c0)=ANY=[@ANYRESOCT, @ANYRES16=r5], 0x1f5) 01:08:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x15, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x0, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:47 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x51d4c0, 0x6) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x8, 0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0xc020660b, 0x70e000) 01:08:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x18, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x0, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 992.802490] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 992.845391] SELinux: failed to load policy 01:08:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x717000) 01:08:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x16, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 992.893537] syz-executor.3 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 992.913864] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 992.937033] CPU: 0 PID: 13851 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 992.944015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.953756] Call Trace: [ 992.956376] dump_stack+0x172/0x1f0 [ 992.960032] dump_header+0x15e/0xa55 [ 992.963770] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 992.968902] ? ___ratelimit+0x60/0x595 [ 992.972804] ? do_raw_spin_unlock+0x57/0x270 [ 992.977233] oom_kill_process.cold+0x10/0x6ef [ 992.981918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 992.987502] ? task_will_free_mem+0x139/0x6e0 [ 992.992021] ? find_held_lock+0x35/0x130 [ 992.996129] out_of_memory+0x936/0x12d0 [ 993.000299] ? lock_downgrade+0x810/0x810 [ 993.004539] ? oom_killer_disable+0x280/0x280 [ 993.009047] ? find_held_lock+0x35/0x130 [ 993.013140] mem_cgroup_out_of_memory+0x1d2/0x240 [ 993.018004] ? memcg_event_wake+0x230/0x230 [ 993.022327] ? do_raw_spin_unlock+0x57/0x270 [ 993.026730] ? _raw_spin_unlock+0x2d/0x50 [ 993.030885] try_charge+0xef7/0x1480 [ 993.034612] ? find_held_lock+0x35/0x130 [ 993.038864] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 993.043716] ? get_mem_cgroup_from_mm+0x139/0x320 [ 993.048563] ? find_held_lock+0x35/0x130 [ 993.052641] ? get_mem_cgroup_from_mm+0x139/0x320 [ 993.057510] memcg_kmem_charge_memcg+0x7c/0x130 [ 993.062186] ? memcg_kmem_put_cache+0xb0/0xb0 [ 993.066693] ? get_mem_cgroup_from_mm+0x156/0x320 [ 993.071564] memcg_kmem_charge+0x136/0x370 [ 993.076066] __alloc_pages_nodemask+0x3c3/0x750 [ 993.080734] ? __alloc_pages_slowpath+0x2870/0x2870 [ 993.085756] ? lockdep_hardirqs_on+0x415/0x5d0 [ 993.090775] ? trace_hardirqs_on+0x67/0x220 [ 993.095191] ? kasan_check_read+0x11/0x20 [ 993.099461] copy_process.part.0+0x3e0/0x7a30 [ 993.104156] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 993.109396] ? delayacct_end+0x5c/0x100 [ 993.113655] ? __delayacct_freepages_end+0xe0/0x140 [ 993.118671] ? __lock_acquire+0x6ee/0x49c0 [ 993.123036] ? __cleanup_sighand+0x70/0x70 [ 993.127300] ? mark_held_locks+0x100/0x100 [ 993.131569] _do_fork+0x257/0xfd0 [ 993.135389] ? fork_idle+0x1d0/0x1d0 [ 993.139118] ? blkg_prfill_rwstat_field_recursive+0x100/0x100 [ 993.145107] ? kasan_check_read+0x11/0x20 [ 993.149438] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 993.154800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 993.159745] ? do_syscall_64+0x26/0x620 [ 993.163840] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.171210] ? do_syscall_64+0x26/0x620 [ 993.175226] __x64_sys_clone+0xbf/0x150 [ 993.179221] do_syscall_64+0xfd/0x620 [ 993.183039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.188323] RIP: 0033:0x45c3f9 [ 993.191649] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 993.212126] RSP: 002b:00007ffe69e38018 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 993.219836] RAX: ffffffffffffffda RBX: 00007fb2a06b2700 RCX: 000000000045c3f9 [ 993.227464] RDX: 00007fb2a06b29d0 RSI: 00007fb2a06b1db0 RDI: 00000000003d0f00 01:08:48 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) [ 993.243638] RBP: 00007ffe69e38230 R08: 00007fb2a06b2700 R09: 00007fb2a06b2700 [ 993.251792] R10: 00007fb2a06b29d0 R11: 0000000000000202 R12: 0000000000000000 [ 993.259917] R13: 00007ffe69e380cf R14: 00007fb2a06b29c0 R15: 000000000075bfd4 [ 993.274972] Task in /syz3 killed as a result of limit of /syz3 [ 993.281491] memory: usage 307160kB, limit 307200kB, failcnt 13877 [ 993.287858] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 01:08:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x0, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 993.336889] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 01:08:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x17, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x7fffffffefff) 01:08:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x19, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 993.374587] Memory cgroup stats for /syz3: cache:68KB rss:210104KB rss_huge:163840KB shmem:48KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:210240KB inactive_file:4KB active_file:0KB unevictable:0KB [ 993.446878] Memory cgroup out of memory: Kill process 6657 (syz-executor.3) score 1113 or sacrifice child [ 993.470822] Killed process 6657 (syz-executor.3) total-vm:72712kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB 01:08:48 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r1, 0x9}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={r1, 0x96c, 0x6}, 0x8) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) [ 993.494790] oom_reaper: reaped process 6657 (syz-executor.3), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB 01:08:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400800, 0x0) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000080)) 01:08:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x0, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x18, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 993.634255] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) 01:08:48 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c686e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) write$ppp(r1, &(0x7f0000000000)="44f55efc1c515222aa0cd4b92a4dac44001a5ae7513a97ae6bd27c8edddb72769d0ee01b2e137dfd9891526f", 0x2c) 01:08:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x21, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:48 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) accept4(r2, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000340), &(0x7f0000000380)) keyctl$chown(0x4, 0x0, 0x0, r6) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x4, 0x5d0, 0x3a8, 0x0, 0x3a8, 0x3a8, 0x150, 0x500, 0x500, 0x500, 0x500, 0x500, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0x110, 0x150, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x400, 0x1, 0x1, [0x7ff, 0x7, 0x3, 0x9, 0x16cc, 0x9, 0x6, 0x8, 0x7f, 0x1, 0x4, 0x8, 0xfff, 0x4, 0x3f, 0x7], 0x7}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0xfffffc00, 0x3d6e1b76, 0xfffffffb, 0x81c, 0x6, 0x6d, 0x0, 0x5]}}}, {{@ipv6={@remote, @loopback, [0xffffff00, 0xffffffff, 0xff000000, 0xff], [0xffffffff, 0xffffffff, 0xffffff00], 'bond0\x00', 'bond_slave_1\x00', {0x17e}, {0xff}, 0x2f, 0x80, 0x2, 0x11}, 0x0, 0x228, 0x258, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x0, 0x3, 0x1ff, 0xfffff800, 0x7d11f941bd34edf8, 0x0, [@rand_addr="ff6d42e5b1afab97cc07676ccd68da45", @dev={0xfe, 0x80, [], 0x29}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @broadcast}, @rand_addr="910abf9b6a81b64966749c95db43f283", @local, @local, @empty, @local, @mcast1, @rand_addr="0f22f462c30df8b4d8f722a96f210ceb", @dev={0xfe, 0x80, [], 0x17}, @local, @local], 0x5}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x3, 0x80, 0x9, 0x1}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0xedaf, 0x3, 0x0, 0x1}}}, {{@uncond, 0x0, 0x130, 0x158, 0x0, {}, [@common=@inet=@udplite={0x30, 'udplite\x00', 0x0, {0x4e21, 0x4e20, 0x4e22, 0x4e20, 0x1}}, @common=@unspec=@owner={0x38, 'owner\x00', 0x0, {r3, r5, r6, r7, 0x2, 0x2}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0xf559}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x630) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:08:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x0, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x19, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 993.937286] SELinux: policydb string SE Lhnux does not match my string SE Linux 01:08:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 994.127284] syz-executor.3 invoked oom-killer: gfp_mask=0x6201ca(GFP_HIGHUSER_MOVABLE|__GFP_WRITE), nodemask=(null), order=0, oom_score_adj=1000 [ 994.148654] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 994.154322] CPU: 0 PID: 13923 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 994.161724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.172115] Call Trace: [ 994.175234] dump_stack+0x172/0x1f0 [ 994.178888] dump_header+0x15e/0xa55 [ 994.182622] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 994.187740] ? ___ratelimit+0x60/0x595 [ 994.191636] ? do_raw_spin_unlock+0x57/0x270 [ 994.196232] oom_kill_process.cold+0x10/0x6ef [ 994.201137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.208331] ? task_will_free_mem+0x139/0x6e0 [ 994.213679] ? find_held_lock+0x35/0x130 [ 994.217776] out_of_memory+0x936/0x12d0 [ 994.221779] ? lock_downgrade+0x810/0x810 [ 994.225954] ? oom_killer_disable+0x280/0x280 [ 994.230478] ? find_held_lock+0x35/0x130 [ 994.234603] mem_cgroup_out_of_memory+0x1d2/0x240 [ 994.239597] ? memcg_event_wake+0x230/0x230 [ 994.243950] ? do_raw_spin_unlock+0x57/0x270 [ 994.248370] ? _raw_spin_unlock+0x2d/0x50 [ 994.252539] try_charge+0xef7/0x1480 [ 994.256276] ? find_held_lock+0x35/0x130 [ 994.260362] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 994.265339] ? kasan_check_read+0x11/0x20 [ 994.269515] ? get_mem_cgroup_from_mm+0x156/0x320 [ 994.274378] mem_cgroup_try_charge+0x259/0x6b0 [ 994.278981] __add_to_page_cache_locked+0x334/0xc20 [ 994.284015] ? find_lock_entry+0x510/0x510 [ 994.288273] add_to_page_cache_lru+0x1c9/0x860 [ 994.292971] ? add_to_page_cache_locked+0x40/0x40 [ 994.297834] ? __page_cache_alloc+0x131/0x450 [ 994.302357] pagecache_get_page+0x364/0xa40 [ 994.306707] grab_cache_page_write_begin+0x7b/0xb0 [ 994.311660] ext4_da_write_begin+0x2d7/0xec0 [ 994.316084] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.322603] ? ext4_write_begin+0x1470/0x1470 [ 994.327117] ? copy_page_from_iter+0x7f0/0x7f0 [ 994.331719] generic_perform_write+0x22a/0x520 [ 994.336327] ? page_endio+0x780/0x780 [ 994.340136] ? current_time+0x140/0x140 [ 994.344118] ? lock_acquire+0x16f/0x3f0 [ 994.348104] ? ext4_file_write_iter+0x23f/0x1060 [ 994.353004] __generic_file_write_iter+0x25e/0x630 [ 994.357952] ext4_file_write_iter+0x32b/0x1060 [ 994.362548] ? mark_held_locks+0x100/0x100 [ 994.366804] ? ext4_file_mmap+0x410/0x410 [ 994.370973] ? mark_held_locks+0x100/0x100 [ 994.375231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.380791] ? iov_iter_init+0xc6/0x1f0 [ 994.384783] __vfs_write+0x587/0x810 [ 994.388510] ? kernel_read+0x120/0x120 [ 994.392428] ? rcu_read_lock_sched_held+0x110/0x130 [ 994.397595] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 994.402381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.408181] ? __sb_start_write+0x1a9/0x360 [ 994.412522] vfs_write+0x20c/0x560 [ 994.416077] ksys_write+0x14f/0x2d0 [ 994.419730] ? __ia32_sys_read+0xb0/0xb0 [ 994.423811] ? do_syscall_64+0x26/0x620 [ 994.427799] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.433183] ? do_syscall_64+0x26/0x620 [ 994.437181] __x64_sys_write+0x73/0xb0 [ 994.441081] do_syscall_64+0xfd/0x620 [ 994.444892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.450087] RIP: 0033:0x459a29 [ 994.453284] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:08:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x0, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 994.473100] RSP: 002b:00007fb2a06d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 994.480849] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 994.489608] RDX: 000000002001007f RSI: 0000000020000080 RDI: 0000000000000004 [ 994.496890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 994.504167] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb2a06d36d4 [ 994.511453] R13: 00000000004c9baa R14: 00000000004e13f8 R15: 00000000ffffffff [ 994.573301] Task in /syz3 killed as a result of limit of /syz3 [ 994.579820] memory: usage 307200kB, limit 307200kB, failcnt 13993 [ 994.586159] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 994.611387] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 01:08:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x21, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 994.627024] Memory cgroup stats for /syz3: cache:68KB rss:210116KB rss_huge:163840KB shmem:48KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:210248KB inactive_file:28KB active_file:0KB unevictable:0KB 01:08:49 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x0, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 994.795231] cgroup: fork rejected by pids controller in /syz0 [ 994.804076] Memory cgroup out of memory: Kill process 6687 (syz-executor.3) score 1113 or sacrifice child [ 994.904892] Killed process 6687 (syz-executor.3) total-vm:72712kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 995.004784] syz-executor.3 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 995.044411] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 995.063790] CPU: 0 PID: 13916 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 995.070778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.080133] Call Trace: [ 995.082728] dump_stack+0x172/0x1f0 [ 995.086364] dump_header+0x15e/0xa55 [ 995.090092] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 995.095200] ? ___ratelimit+0x60/0x595 [ 995.099101] ? do_raw_spin_unlock+0x57/0x270 [ 995.103523] oom_kill_process.cold+0x10/0x6ef [ 995.108114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.113658] ? task_will_free_mem+0x139/0x6e0 [ 995.118164] out_of_memory+0x936/0x12d0 [ 995.122163] ? oom_killer_disable+0x280/0x280 [ 995.126667] ? find_held_lock+0x35/0x130 [ 995.130746] mem_cgroup_out_of_memory+0x1d2/0x240 [ 995.135593] ? memcg_event_wake+0x230/0x230 [ 995.139932] ? do_raw_spin_unlock+0x57/0x270 [ 995.144347] ? _raw_spin_unlock+0x2d/0x50 [ 995.148500] try_charge+0xc4e/0x1480 [ 995.152221] ? find_held_lock+0x35/0x130 [ 995.156309] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 995.161155] ? get_mem_cgroup_from_mm+0x139/0x320 [ 995.166001] ? find_held_lock+0x35/0x130 [ 995.170068] ? get_mem_cgroup_from_mm+0x139/0x320 [ 995.175109] memcg_kmem_charge_memcg+0x7c/0x130 [ 995.179780] ? memcg_kmem_put_cache+0xb0/0xb0 [ 995.184373] ? get_mem_cgroup_from_mm+0x156/0x320 [ 995.189286] memcg_kmem_charge+0x136/0x370 [ 995.193527] __alloc_pages_nodemask+0x3c3/0x750 [ 995.198201] ? __alloc_pages_slowpath+0x2870/0x2870 [ 995.203225] ? lockdep_hardirqs_on+0x415/0x5d0 [ 995.207813] ? trace_hardirqs_on+0x67/0x220 [ 995.212148] ? kasan_check_read+0x11/0x20 [ 995.216317] copy_process.part.0+0x3e0/0x7a30 [ 995.220824] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 995.225947] ? delayacct_end+0x5c/0x100 [ 995.229941] ? __delayacct_freepages_end+0xe0/0x140 [ 995.234972] ? __lock_acquire+0x6ee/0x49c0 [ 995.239242] ? __cleanup_sighand+0x70/0x70 [ 995.243492] ? mark_held_locks+0x100/0x100 [ 995.247752] _do_fork+0x257/0xfd0 [ 995.251220] ? fork_idle+0x1d0/0x1d0 [ 995.254946] ? blkg_prfill_rwstat_field_recursive+0x100/0x100 [ 995.260845] ? kasan_check_read+0x11/0x20 [ 995.265003] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 995.269765] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 995.274538] ? do_syscall_64+0x26/0x620 [ 995.278513] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.286133] ? do_syscall_64+0x26/0x620 [ 995.290115] __x64_sys_clone+0xbf/0x150 [ 995.294098] do_syscall_64+0xfd/0x620 [ 995.297908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.304135] RIP: 0033:0x45c3f9 [ 995.307326] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 995.326233] RSP: 002b:00007ffe69e38018 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 995.333956] RAX: ffffffffffffffda RBX: 00007fb2a064f700 RCX: 000000000045c3f9 [ 995.341316] RDX: 00007fb2a064f9d0 RSI: 00007fb2a064edb0 RDI: 00000000003d0f00 [ 995.348586] RBP: 00007ffe69e38230 R08: 00007fb2a064f700 R09: 00007fb2a064f700 [ 995.355854] R10: 00007fb2a064f9d0 R11: 0000000000000202 R12: 0000000000000000 [ 995.363131] R13: 00007ffe69e380cf R14: 00007fb2a064f9c0 R15: 000000000075c1cc [ 995.388331] Task in /syz3 killed as a result of limit of /syz3 [ 995.401331] memory: usage 306656kB, limit 307200kB, failcnt 14017 [ 995.420110] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 995.440467] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 995.478523] Memory cgroup stats for /syz3: cache:2312KB rss:208140KB rss_huge:161792KB shmem:48KB mapped_file:132KB dirty:132KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:208108KB inactive_file:2272KB active_file:0KB unevictable:0KB [ 995.518701] Memory cgroup out of memory: Kill process 13916 (syz-executor.3) score 1113 or sacrifice child 01:08:50 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r4, &(0x7f0000000c00), 0x4000000000001e6, 0x0) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x303}, "48ee7a9cd1256b9f", "08a81663d499c11ac1617c6f622d1d8d", "974baa4e", "f586c7ea6673cd82"}, 0x28) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x30, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x0, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000080)='%}@\x00', 0x4) r2 = socket$inet6_sctp(0xa, 0xe, 0x84) r3 = ioctl$TIOCGPTPEER(r2, 0x541b, 0x70e000) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000040)=0x200) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:08:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x22, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:50 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) [ 995.557103] Killed process 13916 (syz-executor.3) total-vm:73108kB, anon-rss:2208kB, file-rss:35832kB, shmem-rss:0kB [ 995.576201] oom_reaper: reaped process 13916 (syz-executor.3), now anon-rss:0kB, file-rss:34872kB, shmem-rss:0kB 01:08:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x0, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x30, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 995.757673] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 995.787453] sel_write_load: 2 callbacks suppressed [ 995.787459] SELinux: failed to load policy 01:08:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x31, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:50 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x32, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:51 executing program 3: semctl$SEM_STAT(0xffffffffffffffff, 0x3, 0x12, &(0x7f0000000000)=""/152) write(0xffffffffffffffff, 0x0, 0x32a) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x31, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x44, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000000080)=0x10000, 0x8) r4 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) bind$isdn_base(r5, &(0x7f0000000140)={0x22, 0x7, 0xff, 0x3, 0x9}, 0x6) sendmmsg(r4, &(0x7f0000000c00), 0x4000000000001e6, 0x0) ioctl$int_in(r4, 0x5421, &(0x7f0000000000)=0xd1b) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r6, 0x541b, 0x70e000) r7 = dup3(r6, r6, 0xc0000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r7, 0x28, 0x1, &(0x7f0000000040), 0x8) 01:08:51 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) [ 996.474889] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 996.484585] SELinux: failed to load policy 01:08:51 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200401, 0xc1) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x8, 0x0, 0x6}, 0xa5, 0x7, 'id0\x00', 'timer1\x00', 0x0, 0x9, 0xffffffff80000001, 0x5, 0x9}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x32, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000080)=0x1) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:08:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x51, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 996.753364] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) 01:08:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:51 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x8001) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="249ca3f0bb438cffd1b4080000005345204c686e200000000000d9792794fd7e100b0745f949e79474a32bdfa36de39daa040cb71e2b43921cd7009fa10f230c04b4c685709d2087bb39a4dcd396fedd25708730107061986c9c6dbc20afd19aa63de605344aa9c058871b0d9f9435e99f2050dc2964028e153790c37e12d4965269f68f0f243a5e4fd6a2fa8144d28a76c2f9689b419898822f27fc3c301760d2a76f2b5c89742850ce2994e8d6b5aac31d54fb5a1bcc1ddc4a6d92764e054d368370765453f2c62ea904"], 0x30) [ 996.824534] SELinux: failed to load policy [ 996.937063] SELinux: policydb magic number 0xf0a39c24 does not match expected magic number 0xf97cff8c [ 996.948818] SELinux: failed to load policy [ 996.961228] SELinux: policydb magic number 0xf0a39c24 does not match expected magic number 0xf97cff8c 01:08:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0xf) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 997.006132] SELinux: failed to load policy 01:08:51 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x53, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20082, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4a, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @null, @null, @bcast, @bcast, @default, @default]}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r3, 0x541b, 0x70e000) 01:08:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:52 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) accept4(r2, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r3, 0x5eb857) accept4(r3, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r4, 0x5eb857) accept4(r4, 0x0, 0x0, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r4, @ANYRES64, @ANYBLOB="9afc3e28877bd0127004408e78e8170b39bd8329a37a89b17a4d428a1178d4ff4bc01169a829c54a3173c83e70e8b1d5dde5388876206ad21f0c7c8fa573ed900738"], 0xfffffffffffffe36) 01:08:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400080, 0x4e) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x181800) faccessat(r1, &(0x7f0000000100)='./file1\x00', 0xe, 0x1e00) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r2, 0x541b, 0x70e000) 01:08:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x11) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x60, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:52 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x84) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x480, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1000) r2 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x3, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') r5 = syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x8, 0x3ec4ff44979f7bad) setsockopt$inet6_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000400)='cubic\x00', 0x6) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0xffffffffffffff08, r4, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}]}, 0x20}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800460}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r4, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4022080}, 0x240088c0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x80) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r6, 0x541b, 0x70e000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000140), &(0x7f0000000180)=0x4) 01:08:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x88) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:53 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0xf) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) write$P9_RWALK(r2, &(0x7f0000000080)={0x71, 0x6f, 0x2, {0x8, [{0x88, 0x3, 0x2}, {0x2, 0x3}, {0x98, 0x2, 0x4}, {0xc0, 0x1, 0x3}, {0x10, 0x4, 0x3}, {0x5a, 0x1}, {0x1e, 0x4, 0x1}, {0x20, 0x3, 0x4}]}}, 0x71) 01:08:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0xf00) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:53 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r3, 0x5eb857) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r4, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r5, 0x5eb857) accept4(r5, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r6, 0x5eb857) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg(r7, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r7, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r8 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r8, 0x5eb857) r9 = accept4(r8, 0x0, 0x0, 0x0) sendmmsg(r9, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r9, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r10, &(0x7f0000000080), 0x2001007f) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=0x0, @ANYRES64=r0, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYBLOB="b2c020de64f3f046859816fbd6f2658622477a36f6cd31f39a8fabd115b8b8320d2291a641630a76ff8053a058c32ee97439f0dc134b1a2b2aaacaa1de0edd2bf5461cca5eeffa2763da92beea917b55b22aaebbaea0d1cbdc34"], @ANYRES32=r1, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYBLOB="c9ac7632fc6bdeb7b1fae1212c5bb108ab6399e309c033ad411ae8af0972abf32a32469b062af9967fc0085e69f0b8152f45dc9cd1ef754b84209e54ea4ee2fd582a0f57f23c042d6503f4d275d00c4ea79d854df35df0f9ac68c8bbecd0b63ce260ac3f49d87320530357e98aa270f5641411e209a091c9f048123c855854945449e5681a6a2241643acd683706a8eb7ede6bcd63f06189e97629ca5708c18115e8f914315b8f1a2fa4", @ANYPTR64, @ANYBLOB="b2d2658f8f3b3b9aac5d0e08d9c8af05e639d3e68aef83655665843ab1849b0832ef167ddba3e5dd76f2fb68a61c909d017307354dbe0b053836a7bb935df7278866ec0d67dd4249180bb2779bfcdc8a695904a3a96d058e2bd7d77441", @ANYRESOCT=r2, @ANYPTR, @ANYRESHEX=r4], @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESHEX, @ANYRES32=r1, @ANYPTR64, @ANYRESOCT=r5, @ANYRESHEX=0x0, @ANYPTR64, @ANYRES64, @ANYRESHEX=0x0, @ANYRES32=r7], @ANYRES16, @ANYRES16=r9, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYPTR, @ANYRESHEX=0x0, @ANYBLOB="fef36ea3e6590e83ca29f0953c909ce3d8df5b9cad05a47fdae43a1d88c7e78a911110243d1742563a51692098fd1cc7458d7c8e8f12e4b53cdcb89c31223f3c2f2f4575251c1325e74295a98cc67411c753c2005a106bf7a066bd69801e854ff48d1a2ca45984b33f1c71af9528865f8517858484939950a7ac99af78ccd8832109d7036e0fff9db3bb", @ANYPTR], @ANYRES32=r2, @ANYRESOCT=r10, @ANYRES64=0x0, @ANYRESOCT=r2]], 0x30) 01:08:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x11) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0}, &(0x7f0000000840)=0xc) setpriority(0x1, r2, 0x7fff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x2001007f) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x2001007f) vmsplice(r4, &(0x7f0000000780)=[{&(0x7f0000000300)="a28a73a1cbf8fd899a670b5d48f8846d8b78a85df9bf07e95099f06282a6b3fe0d6dfb710933ec00e28fb5cbb601a90cb808c68f35584c98b59e8d786a0edb20e2d3b00648f58afbcfad67cb1441efbfca477545271930c4e73bd76eedab4c0e0563780f347c41970211244e482eb536fd4a761caeeb9919fe1a717c0833d5f637b758ff1a79dc7a1392", 0x8a}, {&(0x7f0000000440)="f7cf078624e5bf29315231153020d91c48c0a36ac466570fd6f2190770f5c80e4f56e085dc77fceac3fcaae2c1c7aec797ed99c2272165d4e3ce2eedc9681394e612ae28ef52c9694c3e4bda0328401e7b05484a460c7fbde0679d8728fdf29581fcde039e869590ec047a69aaa7846ce57ef37912d7099e3c5760b4c85612425fa547be069997a7dba6445da737e3f38cbafea2e5453f2501f78cba6da8c05b80e48f5b591f9fa1e111641c10a0e27bd258730702808c7b256303110ab81ab2141c1334e9260efa104667db92e179f464003862cbb9238b14", 0xfffffffffffffc6d}, {&(0x7f0000000880)="f1b89c4f2a2099db541864c0dd521ed0dda96346feb043fa1efc5f260fcb0e82348952cbeb71ddf4b4ed17ba04d613ccf5a0b1b0035cb6a683d4353606aa2b78323291721d2295b909518b011cc986e5013aa66d692dd78751bc6dad2d896ade3e", 0x22}, {&(0x7f00000003c0)="0a367e294beae8a3a6fb51bc146e332ca154ed0788c463f7a8d1e79f01aad8801638858764818fade1db8c6827d177229dcb4ee3da27d4ee9f023b11", 0x3c}, {&(0x7f00000005c0)="b4fe0dc8709f270142ec2bc85bac5653e00e16f47371553c2d78e88d9dabeae02c496feef1651b15593392c542157360826a10733209d1e5e5e54328d4457135f1fce081345af82d65cfb3166af6c8c13ec79ebe9da88bf107f899e1cfe6f0297178d18cb00b28b3e392fe184452543b4202282d06d6c62297adde34ae86a95f64f00b684bc1ae31b773a780ac10adf460a70b54b1a4bb360d4500a6c033c0b5f2a0c227fe1bc8fb4f67ca92674fa0203dbe", 0xb2}, {&(0x7f0000000680)="32188608436188f62688ee9c1e64d5d1c8d91b99c6a269f8b0b4a88a11016d35824b05617f200fe3ae52482bfba8db12ed48ed9549d9e618c0dac72140baa349eebc9066a0fbe2fd5ef0dfc7787e502a5bd61197ea4ae4fcd81a014aa198d0ef9205fbe5111a1991c3c0ea3af2bc3ee4c63bbf886cc3c291c6eb095b3292b934fee5d9f5c1d019ed400808e17f481412b99e61d1ea60acd27bcade1a6ff059930c649769bd3067dec0080a21e30e5dc5373f32cdad3cf68807cae4b62b767372f64b4eb5da1eb885ec13afbc2792848626766704a811fb454e682432bc63126bcc4d2a561b76b88a642a5f087dba403ed7b3b54654addb39", 0xf8}], 0x6f1979630f57243f, 0xe98524f3b0720c3f) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r5, 0x541b, 0x70e000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x2001007f) statx(r6, &(0x7f0000000040)='./file0\x00', 0x0, 0x400, &(0x7f0000000100)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x2001007f) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x1d1080, 0x0) r9 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r9, 0x5eb857) r10 = accept4(r9, 0x0, 0x0, 0x0) sendmmsg(r10, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r10, &(0x7f0000000c00), 0x4000000000001e6, 0x0) splice(r8, &(0x7f0000000280), r10, &(0x7f00000002c0), 0x80000001, 0x2) r11 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r11, 0x4c80, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(r7, 0x4c80, r12) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x20400, 0x0) 01:08:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x1100) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 998.749999] syz-executor.3 invoked oom-killer: gfp_mask=0x6201ca(GFP_HIGHUSER_MOVABLE|__GFP_WRITE), nodemask=(null), order=0, oom_score_adj=1000 [ 998.826262] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 998.835469] CPU: 0 PID: 14280 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 998.842462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.851839] Call Trace: [ 998.854458] dump_stack+0x172/0x1f0 [ 998.858119] dump_header+0x15e/0xa55 [ 998.861861] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 998.867019] ? ___ratelimit+0x60/0x595 [ 998.870933] ? do_raw_spin_unlock+0x57/0x270 [ 998.875452] oom_kill_process.cold+0x10/0x6ef [ 998.879979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.885543] ? task_will_free_mem+0x139/0x6e0 [ 998.890070] ? find_held_lock+0x35/0x130 [ 998.894164] out_of_memory+0x936/0x12d0 [ 998.898162] ? lock_downgrade+0x810/0x810 [ 998.902425] ? oom_killer_disable+0x280/0x280 [ 998.906946] ? find_held_lock+0x35/0x130 [ 998.911049] mem_cgroup_out_of_memory+0x1d2/0x240 [ 998.915913] ? memcg_event_wake+0x230/0x230 [ 998.920272] ? do_raw_spin_unlock+0x57/0x270 [ 998.924712] ? _raw_spin_unlock+0x2d/0x50 [ 998.929088] try_charge+0xef7/0x1480 [ 998.932846] ? find_held_lock+0x35/0x130 [ 998.937032] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 998.941925] ? kasan_check_read+0x11/0x20 [ 998.946190] ? get_mem_cgroup_from_mm+0x156/0x320 [ 998.951062] mem_cgroup_try_charge+0x259/0x6b0 [ 998.955676] __add_to_page_cache_locked+0x334/0xc20 [ 998.960748] ? find_lock_entry+0x510/0x510 [ 998.965034] add_to_page_cache_lru+0x1c9/0x860 [ 998.969960] ? add_to_page_cache_locked+0x40/0x40 [ 998.976274] ? __page_cache_alloc+0x131/0x450 [ 998.980982] pagecache_get_page+0x364/0xa40 [ 998.985333] grab_cache_page_write_begin+0x7b/0xb0 [ 998.990395] ext4_da_write_begin+0x2d7/0xec0 [ 998.994832] ? iov_iter_fault_in_readable+0x377/0x450 [ 999.000590] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 999.006361] ? ext4_write_begin+0x1470/0x1470 [ 999.010895] ? copy_page_from_iter+0x7f0/0x7f0 [ 999.015545] generic_perform_write+0x22a/0x520 [ 999.020253] ? page_endio+0x780/0x780 [ 999.024083] ? current_time+0x140/0x140 [ 999.028079] ? lock_acquire+0x16f/0x3f0 [ 999.032076] ? ext4_file_write_iter+0x23f/0x1060 [ 999.036866] __generic_file_write_iter+0x25e/0x630 [ 999.042012] ext4_file_write_iter+0x32b/0x1060 [ 999.046608] ? mark_held_locks+0x100/0x100 [ 999.052210] ? ext4_file_mmap+0x410/0x410 [ 999.056379] ? mark_held_locks+0x100/0x100 [ 999.060973] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 999.066604] ? iov_iter_init+0xc6/0x1f0 [ 999.070599] __vfs_write+0x587/0x810 [ 999.074488] ? kernel_read+0x120/0x120 [ 999.078396] ? rcu_read_lock_sched_held+0x110/0x130 [ 999.083997] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 999.088777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.094768] ? __sb_start_write+0x1a9/0x360 [ 999.099118] vfs_write+0x20c/0x560 [ 999.103476] ksys_write+0x14f/0x2d0 [ 999.107161] ? __ia32_sys_read+0xb0/0xb0 [ 999.111913] ? do_syscall_64+0x26/0x620 [ 999.116522] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.122003] ? do_syscall_64+0x26/0x620 [ 999.126093] __x64_sys_write+0x73/0xb0 [ 999.130077] do_syscall_64+0xfd/0x620 [ 999.134849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.140406] RIP: 0033:0x459a29 [ 999.145054] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 999.166569] RSP: 002b:00007fb2a06d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 01:08:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 999.175759] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 999.183406] RDX: 000000002001007f RSI: 0000000020000080 RDI: 0000000000000004 [ 999.190690] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 999.198452] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb2a06d36d4 [ 999.206775] R13: 00000000004c9baa R14: 00000000004e13f8 R15: 00000000ffffffff 01:08:54 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x84) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 999.231756] Task in /syz3 killed as a result of limit of /syz3 [ 999.265812] memory: usage 307200kB, limit 307200kB, failcnt 15661 01:08:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x3f00) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 999.315918] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 999.346608] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 999.361834] Memory cgroup stats for /syz3: cache:72KB rss:210352KB rss_huge:163840KB shmem:48KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:210444KB inactive_file:52KB active_file:0KB unevictable:0KB [ 999.408440] Memory cgroup out of memory: Kill process 14207 (syz-executor.3) score 1114 or sacrifice child [ 999.418781] Killed process 14207 (syz-executor.3) total-vm:73372kB, anon-rss:2252kB, file-rss:35824kB, shmem-rss:0kB 01:08:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x0, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:54 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/devov4ldev#\x00\x00\x00\x00\x80', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0x80885659, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200c41, 0x0) getpeername$netrom(r2, &(0x7f0000000080)={{}, [@bcast, @netrom, @netrom, @netrom, @rose, @bcast, @default, @rose]}, &(0x7f0000000100)=0x48) [ 999.495373] syz-executor.3 invoked oom-killer: gfp_mask=0x7080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=3, oom_score_adj=1000 [ 999.557582] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 999.569280] CPU: 0 PID: 14279 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 999.576434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.585920] Call Trace: [ 999.588622] dump_stack+0x172/0x1f0 [ 999.592301] dump_header+0x15e/0xa55 [ 999.596073] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 999.601201] ? ___ratelimit+0x60/0x595 [ 999.605125] ? do_raw_spin_unlock+0x57/0x270 [ 999.609569] oom_kill_process.cold+0x10/0x6ef [ 999.614966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.620790] ? task_will_free_mem+0x139/0x6e0 [ 999.625404] out_of_memory+0x936/0x12d0 [ 999.629597] ? oom_killer_disable+0x280/0x280 [ 999.634545] ? find_held_lock+0x35/0x130 [ 999.638649] mem_cgroup_out_of_memory+0x1d2/0x240 [ 999.643512] ? memcg_event_wake+0x230/0x230 [ 999.649878] ? do_raw_spin_unlock+0x57/0x270 [ 999.654760] ? _raw_spin_unlock+0x2d/0x50 [ 999.659136] try_charge+0xc4e/0x1480 [ 999.663140] ? find_held_lock+0x35/0x130 [ 999.667235] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 999.672390] ? get_mem_cgroup_from_mm+0x139/0x320 [ 999.677259] ? find_held_lock+0x35/0x130 [ 999.681350] ? get_mem_cgroup_from_mm+0x139/0x320 [ 999.686234] memcg_kmem_charge_memcg+0x7c/0x130 [ 999.690952] ? memcg_kmem_put_cache+0xb0/0xb0 [ 999.695470] ? get_mem_cgroup_from_mm+0x156/0x320 [ 999.700508] memcg_kmem_charge+0x136/0x370 [ 999.705293] __alloc_pages_nodemask+0x3c3/0x750 [ 999.710074] ? __alloc_pages_slowpath+0x2870/0x2870 [ 999.715909] ? lockdep_hardirqs_on+0x415/0x5d0 [ 999.720531] ? trace_hardirqs_on+0x67/0x220 [ 999.724880] ? kasan_check_read+0x11/0x20 [ 999.729139] copy_process.part.0+0x3e0/0x7a30 [ 999.735659] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 999.741047] ? delayacct_end+0x5c/0x100 [ 999.745059] ? __delayacct_freepages_end+0xe0/0x140 [ 999.750186] ? __lock_acquire+0x6ee/0x49c0 [ 999.754426] ? __cleanup_sighand+0x70/0x70 [ 999.759562] ? mark_held_locks+0x100/0x100 [ 999.763890] _do_fork+0x257/0xfd0 [ 999.767443] ? fork_idle+0x1d0/0x1d0 [ 999.771166] ? blkg_prfill_rwstat_field_recursive+0x100/0x100 [ 999.777057] ? kasan_check_read+0x11/0x20 [ 999.781649] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 999.786517] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 999.791330] ? do_syscall_64+0x26/0x620 [ 999.791349] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.791362] ? do_syscall_64+0x26/0x620 [ 999.791380] __x64_sys_clone+0xbf/0x150 [ 999.791396] do_syscall_64+0xfd/0x620 [ 999.800747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.800760] RIP: 0033:0x45c3f9 [ 999.800773] Code: ff 48 85 f6 0f 84 27 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c fe 8d fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 999.800780] RSP: 002b:00007ffe69e38018 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 999.800793] RAX: ffffffffffffffda RBX: 00007fb2a064f700 RCX: 000000000045c3f9 [ 999.800801] RDX: 00007fb2a064f9d0 RSI: 00007fb2a064edb0 RDI: 00000000003d0f00 [ 999.800808] RBP: 00007ffe69e38230 R08: 00007fb2a064f700 R09: 00007fb2a064f700 [ 999.800815] R10: 00007fb2a064f9d0 R11: 0000000000000202 R12: 0000000000000000 [ 999.800822] R13: 00007ffe69e380cf R14: 00007fb2a064f9c0 R15: 000000000075c1cc [ 999.828433] Task in /syz3 killed as a result of limit of /syz3 [ 999.954688] memory: usage 307096kB, limit 307200kB, failcnt 15661 [ 1000.011593] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1000.021474] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1000.059254] Memory cgroup stats for /syz3: cache:2184KB rss:208228KB rss_huge:161792KB shmem:48KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:208236KB inactive_file:2336KB active_file:0KB unevictable:0KB [ 1000.090974] Memory cgroup out of memory: Kill process 6729 (syz-executor.3) score 1113 or sacrifice child [ 1000.115549] Killed process 6729 (syz-executor.3) total-vm:72712kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 1000.189901] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c [ 1000.211236] SELinux: failed to load policy 01:08:55 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[], 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) accept4(r2, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x8, 0x200000) fcntl$notify(r2, 0x402, 0x1) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000000c0)=""/226) 01:08:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f0000000040), 0x6, r2, 0x2}) fcntl$lock(r2, 0x26, &(0x7f0000000100)={0x0, 0x3, 0x7fff, 0x1, 0xffffffffffffffff}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r3, 0x541b, 0x70e000) 01:08:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x88) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x0, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x4000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:55 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x0, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1000.494743] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) 01:08:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0xf00) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x8400) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 1000.640802] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 1000.673340] CPU: 0 PID: 14464 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 1000.680325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.689692] Call Trace: [ 1000.692403] dump_stack+0x172/0x1f0 [ 1000.696054] warn_alloc.cold+0x7b/0x173 [ 1000.700050] ? zone_watermark_ok_safe+0x260/0x260 [ 1000.704913] ? lock_downgrade+0x810/0x810 [ 1000.709086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.714644] ? avc_has_perm+0x404/0x610 [ 1000.718641] __vmalloc_node_range+0x486/0x790 [ 1000.723148] ? sel_write_load+0x1de/0x470 [ 1000.727305] vmalloc+0x6b/0x90 [ 1000.730508] ? sel_write_load+0x1de/0x470 [ 1000.734666] sel_write_load+0x1de/0x470 [ 1000.738660] __vfs_write+0x114/0x810 [ 1000.742383] ? sel_make_policy_nodes+0x1520/0x1520 [ 1000.747323] ? kernel_read+0x120/0x120 [ 1000.751227] ? __lock_is_held+0xb6/0x140 [ 1000.755320] ? rcu_read_lock_sched_held+0x110/0x130 [ 1000.760355] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1000.765119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.770667] ? __sb_start_write+0x1a9/0x360 [ 1000.774998] vfs_write+0x20c/0x560 [ 1000.778576] ksys_write+0x14f/0x2d0 [ 1000.782222] ? __ia32_sys_read+0xb0/0xb0 [ 1000.786297] ? do_syscall_64+0x26/0x620 01:08:55 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x6, 0x400) getsockname$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000940)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000980)={@remote, @remote, @ipv4={[], [], @loopback}, 0x6, 0x2602, 0x3, 0x400, 0x34, 0x80040020, r1}) io_setup(0x9, &(0x7f0000000380)=0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) io_submit(r2, 0x23a, &(0x7f0000000000)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x3}]) io_destroy(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r5, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r5, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x891b, &(0x7f00000001c0)={'ipddp0\x00', {0x2, 0x4e24, @remote}}) socket$inet6_sctp(0xa, 0x1, 0x84) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x2001007f) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="8db40edb41efff", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r7, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000100)={r7, 0xb3f6, 0xfff, 0x1}, &(0x7f0000000140)=0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x26e1, 0x0) write$cgroup_int(r8, &(0x7f0000000080), 0x2001007f) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r8, 0xc0506617, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) r9 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r9, 0x5eb857) accept4(r9, 0x0, 0x0, 0x0) ioctl$void(r9, 0x0) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGPTPEER(r10, 0x541b, 0x200004) [ 1000.790283] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.795654] ? do_syscall_64+0x26/0x620 [ 1000.799651] __x64_sys_write+0x73/0xb0 [ 1000.803556] do_syscall_64+0xfd/0x620 [ 1000.807364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.815168] RIP: 0033:0x459a29 [ 1000.818366] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1000.837301] RSP: 002b:00007fb2a06d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1000.845037] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1000.852325] RDX: 0000000000000000 RSI: 0000000020000680 RDI: 0000000000000003 [ 1000.859627] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1000.866908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb2a06d36d4 [ 1000.874197] R13: 00000000004c9caf R14: 00000000004e1578 R15: 00000000ffffffff [ 1000.888892] Mem-Info: 01:08:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x0, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1000.891559] active_anon:258829 inactive_anon:1700 isolated_anon:0 [ 1000.891559] active_file:17660 inactive_file:39657 isolated_file:0 [ 1000.891559] unevictable:0 dirty:136 writeback:21 unstable:0 [ 1000.891559] slab_reclaimable:17431 slab_unreclaimable:114456 [ 1000.891559] mapped:59252 shmem:246 pagetables:13513 bounce:0 [ 1000.891559] free:1056941 free_pcp:347 free_cma:0 01:08:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x1100) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 1000.975948] Node 0 active_anon:1037756kB inactive_anon:6808kB active_file:70500kB inactive_file:158700kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:237080kB dirty:596kB writeback:0kB shmem:984kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 432128kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1001.228857] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1001.269877] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1001.365090] lowmem_reserve[]: 0 2555 2557 2557 [ 1001.404597] Node 0 DMA32 free:428516kB min:36248kB low:45308kB high:54368kB active_anon:1029100kB inactive_anon:6808kB active_file:70500kB inactive_file:163000kB unevictable:0kB writepending:4740kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:22432kB pagetables:53960kB bounce:0kB free_pcp:2280kB local_pcp:1356kB free_cma:0kB [ 1001.482597] lowmem_reserve[]: 0 0 2 2 [ 1001.486638] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1001.519017] lowmem_reserve[]: 0 0 0 0 [ 1001.523142] Node 1 Normal free:3784404kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1001.556302] lowmem_reserve[]: 0 0 0 0 [ 1001.560877] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1001.600034] Node 0 DMA32: 337*4kB (UME) 872*8kB (UME) 673*16kB (UME) 2677*32kB (UME) 1347*64kB (UME) 333*128kB (UME) 95*256kB (UM) 44*512kB (UME) 17*1024kB (UME) 20*2048kB (UME) 23*4096kB (UM) = 433012kB [ 1001.631085] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 1001.654518] Node 1 Normal: 61*4kB (U) 220*8kB (U) 264*16kB (UE) 52*32kB (UME) 16*64kB (UME) 6*128kB (U) 9*256kB (UM) 4*512kB (UME) 2*1024kB (M) 2*2048kB (UE) 919*4096kB (M) = 3784404kB [ 1001.672158] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1001.681091] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1001.689744] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1001.699999] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1001.708691] 57704 total pagecache pages [ 1001.712656] 0 pages in swap cache [ 1001.716091] Swap cache stats: add 0, delete 0, find 0/0 [ 1001.721511] Free swap = 0kB [ 1001.724544] Total swap = 0kB [ 1001.727548] 1965979 pages RAM [ 1001.730740] 0 pages HighMem/MovableOnly [ 1001.734721] 338856 pages reserved [ 1001.738319] 0 pages cma reserved [ 1001.741756] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1001.753274] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 1001.759206] CPU: 1 PID: 14468 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 1001.766133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.775479] Call Trace: [ 1001.778074] dump_stack+0x172/0x1f0 [ 1001.781821] warn_alloc.cold+0x7b/0x173 [ 1001.785784] ? zone_watermark_ok_safe+0x260/0x260 [ 1001.790737] ? lock_downgrade+0x810/0x810 [ 1001.794878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.800426] ? avc_has_perm+0x404/0x610 [ 1001.804407] __vmalloc_node_range+0x486/0x790 [ 1001.808903] ? sel_write_load+0x1de/0x470 [ 1001.813044] vmalloc+0x6b/0x90 [ 1001.816226] ? sel_write_load+0x1de/0x470 [ 1001.820368] sel_write_load+0x1de/0x470 [ 1001.824336] __vfs_write+0x114/0x810 [ 1001.828038] ? sel_make_policy_nodes+0x1520/0x1520 [ 1001.832983] ? kernel_read+0x120/0x120 [ 1001.836942] ? __lock_is_held+0xb6/0x140 [ 1001.841000] ? rcu_read_lock_sched_held+0x110/0x130 [ 1001.846004] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1001.850924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.856586] ? __sb_start_write+0x1a9/0x360 [ 1001.860901] vfs_write+0x20c/0x560 [ 1001.864441] ksys_write+0x14f/0x2d0 [ 1001.868071] ? __ia32_sys_read+0xb0/0xb0 [ 1001.872135] ? do_syscall_64+0x26/0x620 [ 1001.876106] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.881461] ? do_syscall_64+0x26/0x620 [ 1001.885450] __x64_sys_write+0x73/0xb0 [ 1001.889331] do_syscall_64+0xfd/0x620 [ 1001.893179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.898386] RIP: 0033:0x459a29 [ 1001.901612] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1001.920515] RSP: 002b:00007fb2a06b1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1001.928224] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1001.935509] RDX: 0000000000000000 RSI: 0000000020000680 RDI: 0000000000000003 [ 1001.942769] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1001.950026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb2a06b26d4 [ 1001.957291] R13: 00000000004c9caf R14: 00000000004e1578 R15: 00000000ffffffff [ 1001.964835] Mem-Info: [ 1001.967291] active_anon:257263 inactive_anon:1702 isolated_anon:0 [ 1001.967291] active_file:17660 inactive_file:39805 isolated_file:0 [ 1001.967291] unevictable:0 dirty:162 writeback:0 unstable:0 [ 1001.967291] slab_reclaimable:17540 slab_unreclaimable:114217 [ 1001.967291] mapped:59245 shmem:246 pagetables:13457 bounce:0 [ 1001.967291] free:1058620 free_pcp:601 free_cma:0 [ 1002.001983] Node 0 active_anon:1029052kB inactive_anon:6808kB active_file:70500kB inactive_file:159220kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236980kB dirty:664kB writeback:0kB shmem:984kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 428032kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1002.030518] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1002.056898] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1002.083238] lowmem_reserve[]: 0 2555 2557 2557 [ 1002.087835] Node 0 DMA32 free:434196kB min:36248kB low:45308kB high:54368kB active_anon:1029052kB inactive_anon:6808kB active_file:70500kB inactive_file:159220kB unevictable:0kB writepending:664kB present:3129332kB managed:2619972kB mlocked:0kB kernel_stack:22240kB pagetables:53828kB bounce:0kB free_pcp:2396kB local_pcp:1468kB free_cma:0kB [ 1002.118501] lowmem_reserve[]: 0 0 2 2 [ 1002.122350] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1002.148302] lowmem_reserve[]: 0 0 0 0 [ 1002.152128] Node 1 Normal free:3784404kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1002.179834] lowmem_reserve[]: 0 0 0 0 [ 1002.183667] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1002.197433] Node 0 DMA32: 337*4kB (UME) 924*8kB (UME) 701*16kB (UME) 2688*32kB (UME) 1347*64kB (UME) 333*128kB (UME) 95*256kB (UM) 44*512kB (UME) 17*1024kB (UME) 20*2048kB (UME) 23*4096kB (UM) = 434228kB [ 1002.215880] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 1002.227513] Node 1 Normal: 61*4kB (U) 220*8kB (U) 264*16kB (UE) 52*32kB (UME) 16*64kB (UME) 6*128kB (U) 9*256kB (UM) 4*512kB (UME) 2*1024kB (M) 2*2048kB (UE) 919*4096kB (M) = 3784404kB [ 1002.244323] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1002.253262] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1002.261919] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1002.270820] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1002.279825] 57711 total pagecache pages [ 1002.283815] 0 pages in swap cache [ 1002.287254] Swap cache stats: add 0, delete 0, find 0/0 [ 1002.292662] Free swap = 0kB [ 1002.295674] Total swap = 0kB [ 1002.298779] 1965979 pages RAM [ 1002.301878] 0 pages HighMem/MovableOnly 01:08:57 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f00000000c0)={0x50, 0xfffffffffffffffe, 0x5, {0x7, 0x1f, 0xbb3, 0x1000, 0x3ff, 0x2, 0x1f8f6bb7, 0x1}}, 0x50) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETXF(r2, 0x5434, &(0x7f0000000140)={0x4, 0x2, [0xcd7d, 0x8, 0x9, 0x7, 0x6], 0xfffa}) 01:08:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x0, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x8800) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:57 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x3f00) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x0) connect$ax25(r1, &(0x7f0000000080)={{0x3, @null, 0x8}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @default]}, 0x48) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r2, 0x541b, 0x70e000) socket$nl_xfrm(0x10, 0x3, 0x6) [ 1002.305833] 338856 pages reserved [ 1002.309343] 0 pages cma reserved 01:08:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r2, 0x541b, 0x70e000) [ 1002.417523] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1002.449510] SELinux: failed to load policy 01:08:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x0, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0xff0f) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x8400) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 1002.487820] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1002.579215] SELinux: failed to load policy 01:08:57 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x12046880, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) accept4(r1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r3, 0x5eb857) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r5, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r5, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r6 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r6, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r6, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r7 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r7, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r7, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r8 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r8, 0x5eb857) r9 = accept4(r8, 0x0, 0x0, 0x0) sendmmsg(r9, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r9, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r10 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r10, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r10, &(0x7f0000000300)={0x0, 0xfffffffffffffd38, 0x0, 0xfffffffffffffe22, 0x0, 0xfffffffffffffec4}, 0x0) write$selinux_load(r0, &(0x7f0000000480)=ANY=[@ANYRES32=r10, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESHEX=r3, @ANYRES64=r9, @ANYRES64, @ANYRESDEC], @ANYRESHEX=r4, @ANYRESHEX=r0, @ANYBLOB="f91e26a22e9c37f11607e44a3ef9788217b70df5aebe891560da1faa1bf301d1fe5ae42054fea605aeef01151a38bf57bdb2ce5153ca3ab881433e7dfc9aba21ecae9d6e04a343255859ee100c5441d00adec474c01ec0d238b66bc0e075207c7063fb51356103dfe85ec59bbd7eea47e12018f1e1abc2faf500"/142, @ANYRESHEX, @ANYRESOCT=r6, @ANYRES32=r7], 0xeb) 01:08:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x0, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:57 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x1000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x0, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x8800) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x0, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1003.107810] SELinux: policydb magic number 0xe does not match expected magic number 0xf97cff8c [ 1003.155094] SELinux: failed to load policy 01:08:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0xf000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:08:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0xff0f) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:58 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x1000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x11000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:58 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000000)={0x0, {0x4, 0x10000}}) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f00000000c0)={0x7, "dabad990926ccba18eb117f131a272034f606818796ec9216923daacacab2bf9", 0x0, 0xebc2, 0x5, 0x20000, 0x10804, 0x6}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:08:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) accept4(r2, 0x0, 0x0, 0x0) r3 = dup2(r2, r1) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000080)={0x0, 0x3, 0x7fffffff, &(0x7f0000000040)=0x1ff}) 01:08:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1003.829736] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1003.862178] SELinux: failed to load policy 01:08:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x3f000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0xf000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1003.910687] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1003.937129] SELinux: failed to load policy 01:08:58 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(0xffffffffffffffff) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:58 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) write(0xffffffffffffffff, 0x0, 0xfffffe43) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cp\x06ey\xa6\xf9\x05\xfb\xe7U\x85(\x00\xae\xb0\xef\x1e<\xb6QP\xe4jq\x8a\xb018PHv9{K}S\xcb=\x80\xfe\xb1@\xd1Y\x1e\xf1y\xac\"\xd1\x11\x89\xfb\x00\x8d~\xe3~\x85\x11H\xe2\xb1\x16lE\xe69\xf7\xfa\x17=\xf6\x95\xe3R\xe9Z\xa9\x13\xb8:\xc5\x97\xd4`Zwt\a\xcfl\xeaLD=\xdd\xfe\fW?Q\x16[P%\xacs\xa9\xa5 \xd5k-\xab\xc3\xa0!\x94\x17\x04`\x88o\x9e1e\x86\xf2\xa1k\xa1\xe9\x99x', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f00000000c0)=0x1) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x59dc84e1872b41f2) listen(r1, 0x5eb857) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r4, 0x5eb857) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000000400)=[{{0x0, 0xfffffffffffffdd2, 0x0, 0x0, 0x0, 0x6}}], 0x4000000000000ad, 0x800) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r6 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r6, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r6, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x4) r7 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r7, 0x5eb857) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x58, &(0x7f0000000240)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x9, 0x1f, @mcast2, 0x20}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e23, 0x1e75, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7ff}]}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000003c0)={r8, 0x800, 0xfff7, 0x80000005, 0x1, 0xfffff800}, &(0x7f0000000440)=0xfffffffffffffe74) r9 = dup3(r3, r6, 0x80000) ioctl$PPPIOCATTCHAN(r9, 0x40047438, &(0x7f0000000040)=0x4) ioctl$SIOCGETNODEID(r5, 0x89e1, &(0x7f0000000200)={0x4}) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r10, &(0x7f0000000080), 0x2001007f) write$selinux_load(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYRES16=r10], 0x2) 01:08:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x40000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x11000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x84000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1a, &(0x7f00000000c0)="3c190448ea23ba41a42ad71e78ce487b552dbac0147ff1102b314d2c7824b7f4989963668a722053da21396cfd43b5d91a233a04bbc86815aa5806cdd09a599d5c35a6a860aee7ce1a13ee8e785e0dd4719f6da9f853c74b122e624df5fbc6b4a801af7664f0eca2febed88de39e6e2386a3d879dd79a09bee6fc39b6f", 0x7d) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r2, 0x541b, 0x70e000) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r3, 0x5eb857) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r4, &(0x7f0000000c00), 0x4000000000001e6, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x29, "510e4bd60206ac9bd90eeec8014617d26a44f3ba3393c3216f7692d9ebabcd60b801eb075e6d48af8a"}, &(0x7f0000000180)=0x31) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r5, &(0x7f0000000200)=0x4) 01:08:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x3f000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r3) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r4, 0x4) r5 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r5) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r6, 0x8907, &(0x7f00000003c0)) r7 = getpid() fcntl$lock(r6, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r7}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r8, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r9 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r10 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r11 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r11) pread64(r10, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:08:59 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(0xffffffffffffffff) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:08:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x88000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:08:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r3) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r4, 0x4) r5 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r5) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r6, 0x8907, &(0x7f00000003c0)) r7 = getpid() fcntl$lock(r6, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r7}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r8, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r9 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r10 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r11 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r11) pread64(r10, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:00 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x10002200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64, @ANYRES64, @ANYRES32=r0]], 0x8) 01:09:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x84000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r3) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r4, 0x4) r5 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r5) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r6, 0x8907, &(0x7f00000003c0)) r7 = getpid() fcntl$lock(r6, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r7}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r8, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r9 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r10 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r11 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r11) pread64(r10, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0xff0f0000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(0x0, &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x88000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:00 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cd6dc9260e436f8f9080000005345204c696eff22ebb4a962010016f96f22093bf82000400000004b8008691ff9dc0100df7700"/68], 0x30) 01:09:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x100000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(0x0, &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0xff0f0000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:00 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(0xffffffffffffffff) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) fstat(r3, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000b80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000b40)={&(0x7f0000000840)={0x300, 0x13, 0x9, 0x8, 0x70bd2d, 0x25dfdbfe, {0x953795725dffa44, 0x0, 0x8}, [@nested={0xb8, 0x4d, [@typed={0xb4, 0x7f, @binary="de4d2062cd3f8b15662d4c85e80cfa65d56695604c7c87ce2252c040ba0734b1ef229188c332f3cc063b8ff8386d0ebe66da74baa690c5c78e30985ba1f7e46dfc366fe3fd6c6ef5f63609a1bf4a8886de9fa2e0da75922104108f9d6a9d0f619867be27db924185e7d33096d886c9a913dc0f344351d00e569f7bb67b2bb7f472346b6238a978c0cbfbe396b2d88c8b50b0e5b4a9bcb30955b10a2c6968c5df7d989e93393000a7694155568080"}]}, @nested={0x90, 0x44, [@generic="9fb86b2bcd88e1396372e4980f1198ea2e360da27af19bf039d1128e04451fc01328a032ed835fa8e503aad7c4c4b9392fa94a99d6e745a682d82363a6d7ae4a3254d832006612e7341743cf6889c16d245d46c79347f146f14fac5a40359b9d29cab6e682a87b137835b684bcd99f3b300809ef28f6324793a23bd3c30a224768e98e32efdebc01191fd64a"]}, @nested={0x98, 0x4, [@typed={0x8, 0x3a, @uid=r4}, @generic="8dcd96212ef964669b219baf8d7a18276142f950dca35ff6557e88bc9c2c30b2608d906d48ba2a98e1a6a149d1ed5d5f7651e5b793ba5d7706f48d80f7e561b4053af0b58f4cd4861f3b544c203726c2aa1e7108ad9c58b54371cc356130c5def6a09e57d9fb41ec6483115a4cfc0a4000c8dfc5ca76a2cc9363edc56e1c7e2b76", @typed={0x8, 0x12, @u32=0x3}]}, @typed={0x14, 0x12, @str='self%vboxnet0:\x00'}, @generic="90bfe815d315b60735be46ffa276ad69bc989354bafdab3027beaacddd64950347b974a3363ed5b49a2d73a2d70ea587a4134857288bc1d48e65c6226271b9cff752f8dc87bdcedd24fc572e1abb68354f706f42ac754fef22ad01aef89afa5f09fb727dcb2026cf5d2624d501b40265825524ce4f25eacc2a82a10b8f50a64bc0c50ec0f01f70fafd5107eee6956532e200c698bccf80b7bb331990fb3eb3879cd3079f139bf2fed29061a5c7db438ef338060f18c938d6669eb709f34da8239666a587d80ada17e9e838fccb94498f177bd453d81b01a1ff634cf9598ba97e3dca5d06cc7c844afe9c9c98c2f29cc9a86e2ca4d1"]}, 0x300}, 0x1, 0x0, 0x0, 0x4000001}, 0x84040) write$binfmt_elf32(r2, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0xe1, 0xf2, 0x20, 0x6, 0x10001, 0x2, 0x0, 0x4, 0x130, 0x38, 0x371, 0x6, 0x6, 0x20, 0x1, 0xaec, 0x101, 0x80}, [{0x70000000, 0x1f, 0x0, 0x6, 0x4, 0x540, 0x3, 0x8}, {0x5, 0x5, 0x80000000, 0x28, 0x0, 0x8, 0x40}], "fd64a41748d429bd62a2f82b62379bf087b1b260e862fe3a6e7f5df4e2081f7c5b2ebf39e272dc9b564a11706f2d6c2777c6d0df5aa8f077ddab1545be5447a898a61cc8c1dbb450d2c5394a020fcd5c797fbde97683e94e1060026f5fa16edc661209135e4703d92434a375d71fb68f41776489158089939b446ae79a9622e49eb240bc9df9440f70df41f5fcc7fad39951d6ecee644c0a18a821cdbe63bc37fa380d7db72fc0f858", [[], [], [], [], [], []]}, 0x721) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r5, 0x541b, 0x70e000) [ 1005.766584] SELinux: policydb magic number 0xd67cff8c does not match expected magic number 0xf97cff8c 01:09:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(0x0, &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1005.811695] SELinux: failed to load policy 01:09:00 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x400040, 0x0) write$P9_RLOPEN(r0, &(0x7f00000001c0)={0x18, 0xd, 0x2, {{0x11, 0x0, 0x8}, 0xff}}, 0x18) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="81020000001583b8d9040000696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee70a390bf37e802f1c4c781a79a6d5f5214a168e558f30110c4be2805294cff49d2b88b1d8effdc7062055cb6df7cf64d755c597666dc94981642f6d8b7655f95076449f66c020513c9bb7749ceb235ecc9ba3681ac12f112a76d4f2584e099a6f47c1c37a28c8803122e1303138e8f5ab00f252727feaa0cb2e998e5d88d97af6d09cd6f33be7200"], 0x30) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) dup3(r2, r0, 0x52e857f18234aad1) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, &(0x7f0000000040)=0x3, 0x4) 01:09:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x100000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0xf00000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', 0x0, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1006.014324] SELinux: policydb magic number 0x281 does not match expected magic number 0xf97cff8c [ 1006.039197] SELinux: failed to load policy 01:09:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', 0x0, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0xf00000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x1100000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:01 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(0x0, 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', 0x0, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x1100000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x11010, &(0x7f0000000240)=ANY=[@ANYBLOB="7472616e733d756e69786d61702c6e6f6465766d61702c0600636573733d", @ANYRESDEC=r1, @ANYBLOB=',access=client,cachetag=,version=9p2000.L,uname=*]cpusetcgroupvboxnet1/,posixacl,afid=0x00000000ffffffff,dont_appraise,audit,euid>', @ANYRESDEC=r3, @ANYBLOB=',fscontext=root,defcontext=unconfined_u,measure,\x00']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r5, 0x541b, 0x70e000) 01:09:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(0x0, &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1006.835022] SELinux: policydb magic number 0x281 does not match expected magic number 0xf97cff8c 01:09:01 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000b173e44457975ebdfff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:09:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x3f00000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x3f00000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(0x0, &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:01 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(0x0, 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) [ 1006.875700] SELinux: failed to load policy 01:09:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000040)) 01:09:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(0x0, &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x8400000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 1007.103602] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) 01:09:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x4000000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 1007.147804] SELinux: failed to load policy 01:09:02 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9081000005345204c6982757816000000d9792794fdfffeffaf0fdbf24571d7a500ed08691ff9dc0100df77ee"], 0x30) 01:09:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0x8800000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:02 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(0x0, 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) [ 1007.381150] SELinux: policydb string length 4104 does not match expected length 8 01:09:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1007.432924] SELinux: failed to load policy 01:09:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x8400000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:02 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x80, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0xeb9f843f00763ee7}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=@gettaction={0xfc, 0x32, 0x810, 0x70bd2a, 0x25dfdbfe, {}, [@action_gd=@TCA_ACT_TAB={0x88, 0x1, [{0x10, 0xf, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x14, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8}}]}, @action_gd=@TCA_ACT_TAB={0x60, 0x1, [{0x10, 0x12, @TCA_ACT_INDEX={0x8, 0x3, 0x401}}, {0x14, 0x20, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x9dbc}}, {0x14, 0x1f, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) write$P9_RWALK(r2, &(0x7f0000000000)={0x16, 0x6f, 0x2, {0x1, [{0x0, 0x3, 0x3}]}}, 0x16) write$selinux_load(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:09:02 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$RTC_VL_CLR(r1, 0x7014) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fd, &(0x7f00000000c0)="c84377690982910eaf7f2b19d0bc83d7dd81916e373f5b7b9bb1deb782a9131754d46cb7f738c0ed25235fa0fc921244499af3d0d539f770bd8abc22f8b9f715f3758e5742e7fd6a4ac3e119d0d57be87cdc1c9cbb70695651ae337b2b3e09b0453c35d0125eb6b2bbe75ac8ddb3215fce07abdbb782053d13e0aaa0180cf136d92637073311431fc274f171f5ff7927478b6b01c0863628c938681cca50b204913b8e89a8cb92a538d09f44a7a29036331f4a77824745afe899c3da9c33fac4a0912c0174f33cb2f078235012bc2fc6aac7c9be65a466bbb443197d503a59bd2cab9b9808fbdb67fbd57eca") [ 1007.853598] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1007.868054] SELinux: failed to load policy [ 1007.885172] syz-executor.3 invoked oom-killer: gfp_mask=0x6201ca(GFP_HIGHUSER_MOVABLE|__GFP_WRITE), nodemask=(null), order=0, oom_score_adj=1000 01:09:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)=0x7ff) 01:09:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)=0xff0f000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0x8800000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) [ 1007.898790] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 1007.914702] CPU: 1 PID: 15176 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 1007.921707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.931088] Call Trace: [ 1007.933690] dump_stack+0x172/0x1f0 [ 1007.937332] dump_header+0x15e/0xa55 [ 1007.941055] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1007.946167] ? ___ratelimit+0x60/0x595 [ 1007.950062] ? do_raw_spin_unlock+0x57/0x270 [ 1007.954481] oom_kill_process.cold+0x10/0x6ef [ 1007.958994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1007.964538] ? task_will_free_mem+0x139/0x6e0 [ 1007.969045] ? find_held_lock+0x35/0x130 [ 1007.973120] out_of_memory+0x936/0x12d0 [ 1007.977115] ? lock_downgrade+0x810/0x810 [ 1007.981277] ? oom_killer_disable+0x280/0x280 [ 1007.985783] ? find_held_lock+0x35/0x130 [ 1007.989867] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1007.994722] ? memcg_event_wake+0x230/0x230 [ 1007.999062] ? do_raw_spin_unlock+0x57/0x270 01:09:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x10000) fsetxattr$security_smack_transmute(r2, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) [ 1008.003479] ? _raw_spin_unlock+0x2d/0x50 [ 1008.007634] try_charge+0xef7/0x1480 [ 1008.011377] ? find_held_lock+0x35/0x130 [ 1008.015456] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1008.020318] ? kasan_check_read+0x11/0x20 [ 1008.024481] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1008.029345] mem_cgroup_try_charge+0x259/0x6b0 [ 1008.033951] __add_to_page_cache_locked+0x334/0xc20 [ 1008.038985] ? find_lock_entry+0x510/0x510 [ 1008.043244] add_to_page_cache_lru+0x1c9/0x860 [ 1008.047841] ? add_to_page_cache_locked+0x40/0x40 01:09:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) [ 1008.052699] ? __page_cache_alloc+0x131/0x450 [ 1008.057209] pagecache_get_page+0x364/0xa40 [ 1008.061547] grab_cache_page_write_begin+0x7b/0xb0 [ 1008.066506] ext4_da_write_begin+0x2d7/0xec0 [ 1008.070937] ? iov_iter_fault_in_readable+0x377/0x450 [ 1008.076146] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1008.081695] ? ext4_write_begin+0x1470/0x1470 [ 1008.086201] ? copy_page_from_iter+0x7f0/0x7f0 [ 1008.090905] generic_perform_write+0x22a/0x520 [ 1008.095512] ? page_endio+0x780/0x780 [ 1008.099326] ? current_time+0x140/0x140 01:09:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x4, 0x0) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000040)=""/49) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000080)=""/4096) ioctl$TIOCGPTPEER(r2, 0x541b, 0x70e000) [ 1008.103329] ? lock_acquire+0x16f/0x3f0 [ 1008.107323] ? ext4_file_write_iter+0x23f/0x1060 [ 1008.112092] __generic_file_write_iter+0x25e/0x630 [ 1008.117040] ext4_file_write_iter+0x32b/0x1060 [ 1008.121632] ? mark_held_locks+0x100/0x100 [ 1008.125879] ? ext4_file_mmap+0x410/0x410 [ 1008.130037] ? mark_held_locks+0x100/0x100 [ 1008.134290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1008.139842] ? iov_iter_init+0xc6/0x1f0 [ 1008.143834] __vfs_write+0x587/0x810 [ 1008.147571] ? kernel_read+0x120/0x120 [ 1008.151599] ? rcu_read_lock_sched_held+0x110/0x130 [ 1008.156637] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 1008.161405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1008.166957] ? __sb_start_write+0x1a9/0x360 [ 1008.171298] vfs_write+0x20c/0x560 [ 1008.174861] ksys_write+0x14f/0x2d0 [ 1008.178519] ? __ia32_sys_read+0xb0/0xb0 [ 1008.178536] ? do_syscall_64+0x26/0x620 [ 1008.178550] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1008.178568] ? do_syscall_64+0x26/0x620 [ 1008.191959] __x64_sys_write+0x73/0xb0 [ 1008.191979] do_syscall_64+0xfd/0x620 [ 1008.191998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1008.208821] RIP: 0033:0x459a29 [ 1008.212296] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1008.231231] RSP: 002b:00007fb2a06d2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1008.239099] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 1008.246817] RDX: 000000002001007f RSI: 0000000020000080 RDI: 0000000000000004 [ 1008.254087] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1008.261365] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb2a06d36d4 [ 1008.268642] R13: 00000000004c9baa R14: 00000000004e13f8 R15: 00000000ffffffff 01:09:03 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="8e742f226e3085ba", 0x8, 0xfffffffffffffff8) keyctl$update(0x2, r3, &(0x7f0000000280)="9766148042f6e9724053", 0xa) ioctl$TIOCGPTPEER(r2, 0x541b, 0x70e000) getpeername$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffff, 0x10000) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r5, 0x6430) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000040)=0x0) write$P9_RGETLOCK(r4, &(0x7f0000000080)=ANY=[@ANYBLOB="1f000000370200000500"/24, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00'], 0x1f) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x8, 0x3f, 0x1, 0x1, 0x0, 0x400, 0xf0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x5, @perf_bp={&(0x7f0000000100), 0x9faa013e340b8cfe}, 0x10004, 0x9, 0x4, 0x6, 0xae, 0x4, 0x80}, r6, 0x7, 0xffffffffffffffff, 0x5) 01:09:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value={0x0, 0x4}, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) r5 = dup3(r4, r2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x0, @loopback, 0x8}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e23, 0x4, @mcast1, 0x6}, @in6={0xa, 0x4e20, 0x8, @remote, 0x5297}], 0x64) 01:09:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1008.299246] Task in /syz3 killed as a result of limit of /syz3 [ 1008.311109] memory: usage 307156kB, limit 307200kB, failcnt 18673 [ 1008.337191] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1008.378549] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1008.403305] Memory cgroup stats for /syz3: cache:108KB rss:209064KB rss_huge:161792KB shmem:48KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:209092KB inactive_file:0KB active_file:0KB unevictable:0KB [ 1008.448124] Memory cgroup out of memory: Kill process 14602 (syz-executor.3) score 1113 or sacrifice child [ 1008.465297] Killed process 14602 (syz-executor.3) total-vm:73240kB, anon-rss:2240kB, file-rss:35796kB, shmem-rss:0kB 01:09:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)=0xff0f000000000000) r4 = dup2(r1, r3) dup3(r4, r2, 0x0) 01:09:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000140)=ANY=[@ANYBLOB="3900000000000000fffbffffffffffff03000000fbffff7f9c2449920000000000800000000000000800000000000000af0000000000000000000000000000000000000000000000011c00000000000000000000000000002601b6bfdf2520735b4323cb077bea57ccae02f34e6ee3334fcb660ff83a15d53ae12c4555c7d3df187096ca71db2b33f56871476fcb0183d9acb8a49e3f44d76be41ca18d561e69664fe095cad05cc057158859f90a3fea052deff5d66894c1521d198c942d09becc300675f498bc44d45de717502d3cb05e4e3bc84ec7a12ad5c369cdbf2148c5c42d4a8266c20f2914d95052885e460eebcd183c5d"]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x2001007f) sendmsg$sock(r3, &(0x7f00000003c0)={&(0x7f0000000040)=@ethernet={0x306, @local}, 0x80, &(0x7f0000000680)=[{&(0x7f00000000c0)="e88439bac201114e583d3817c7f40f6355f322f1c3281c086aa7c2b3638e367146d629c43bd0cdff6130f12f64716791b8bd2b04216da4774beaf8aa60b66e3a0eb2a866b2cbe33531553961cc04f9b90c012fb2f5c04a475e851300053d830b43cd2d0969d3abddda2ea3c006b7622f9801886f8d08bdc17dfc1d8c", 0x7c}, {&(0x7f0000000240)="4f1a88bb76e2bf4c04fae48c5524894aedc768cec1e773c38bca652611f841431c9fe88f6f94416bc0d7e0986db26e30a5074cc138797171b660569c259808e9b99abe8e23077bcb970dfe23d92572136bf44289ef3b87b8c5236ef93446a5a824630100d5d36affce7cac56e21bc9aa747dcea80cb562229a00d6f247f9990eeeed3dab47b9d73e8a2575bf44a7ab474403363949dbff9f877b535a2d5b0fa35040e16c08399242077625253d598db1bce31b644c57e8c52e8bf1c2c900e125bceab5cf342516d2f3", 0xc9}, {&(0x7f0000000340)="50c1a257e3587c5000c6c8ff953469c8e559a78248f6d2fdf67933171ca906e50d1e2c7f348394d8c399acc9afef0f3332598aba2c74498202c6ee86f72e686af39544ba4b3d312aeafd20ade34c3c4ebcf0a79ef43dad3d48d3cb30f3b90a484c0a", 0x62}, {&(0x7f0000000440)="b600ba7b108a35e3eda38debfac3fec4528bc2d4b4faf101c7ad8672248d4f5d97a657cffd1af20efe4a17869e2e9a1c291fa6c66b25381734729c5f72afb5c6b5364015e4aa8dc22e44", 0x4a}, {&(0x7f00000004c0)="f542cf675a35c69f1753903b7e6f85627ed564dfc3eff90db76236c91902d8bf48fca1f0358644cff4b2ce73bb76452db2b7c2a95a53695dbec2e9ab9fc8ab10f66c63f96cfed3e10f5c518078bcc2bbb4a44e599a86e6096ed485532ee3c473461f3f6891361301d71757d36d8190da680bd83c19c3c01e953c81c46bb9489b549ec50aad58139467ac2adfe03e98a3c01c72e9a04da36f6b66d2e22713cba9", 0xa0}, {&(0x7f0000000580)="fee598dcb6e055df38859e1bc1e960abf56c5f32081e138f79cc0a4e8a8e1b5d17e30a234ebb681012906393a35cf297c5dbfa50dd71bc6ffee43a0400eedd6ae6521d3a8f4a1eedf38ba03b0fe81b6184f7e18e392fb1037d5b8494a0b6cc55ae44a5d457506a65a2c7b2e18dd09a491b2892ae3810cdb3e6d7a4078d4b3870236de7f674d94f6f34ecf3284bd3b3f1e37924c1cb87bad63c6df0bcead6d61bc4a93026d45d8c3f950181e475ba6be932a179b43604aa5c2872bfb55bc9a2928c04e23fbe48f8f9fa", 0xc9}], 0x6, &(0x7f0000000700)=[@timestamping={{0x14, 0x1, 0x25, 0xe}}, @timestamping={{0x14, 0x1, 0x25, 0x101}}, @mark={{0x14, 0x1, 0x24, 0xd02}}, @mark={{0x14, 0x1, 0x24, 0x40}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0xf49f}}, @timestamping={{0x14, 0x1, 0x25, 0x7ff}}], 0xf0}, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/checkreqprot\x00', 0x400000, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r5, 0x5eb857) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg(r6, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r6, &(0x7f0000000c00), 0x4000000000001e6, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000840)={0x0, 0x7ff, 0x10, 0x3, 0x1}, &(0x7f0000000880)=0x18) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f00000008c0)={r7, 0x0, 0x1, [0x2]}, &(0x7f0000000900)=0xa) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r8, 0x541b, 0x70e000) 01:09:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x2001007f) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x50, 0x0, &(0x7f00000002c0)) r5 = dup2(r1, r4) dup3(r5, r2, 0x0) 01:09:03 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x5eb857) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x140000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x200, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8c0}, 0x800) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES64=0x0, @ANYRESDEC=r2]], 0x8) [ 1008.655108] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1008.675842] SELinux: failed to load policy 01:09:03 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, r2, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x29, 0x0, &(0x7f00000002c0)) r5 = dup2(r1, r4) dup3(r5, r3, 0x0) [ 1008.918867] SELinux: policydb magic number 0x20000000 does not match expected magic number 0xf97cff8c 01:09:03 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf96e75781600000000fefffff820004000000000ed08691ff9dc0100df77ee0000000000"], 0x30) [ 1008.969298] SELinux: failed to load policy 01:09:03 executing program 0: openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x6, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2cac293123d74a40, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x12}}}, 0x2cd) listen(r1, 0x5eb857) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r4, 0x5eb857) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r5, &(0x7f0000000c00), 0x4000000000001e6, 0x0) bind$unix(r5, &(0x7f00000002c0)=@abs={0x2, 0x0, 0x4e24}, 0x6e) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000001c0)='!^\x00') ioctl$TIOCGPTPEER(r6, 0x541b, 0x70e000) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x2001007f) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r7, 0x80dc5521, &(0x7f0000000100)=""/163) 01:09:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r11 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r11) pread64(0xffffffffffffffff, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:04 executing program 3: write(0xffffffffffffffff, 0x0, 0x93) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) [ 1009.114693] SELinux: policydb string length 376993134 does not match expected length 8 [ 1009.128529] SELinux: failed to load policy 01:09:04 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r11 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r11) pread64(0xffffffffffffffff, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1009.292226] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1009.325501] SELinux: failed to load policy 01:09:04 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x55a7962c8b6db328) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r2, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={r2, 0x3d8c}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r3, 0x2cc}, &(0x7f0000000180)=0x8) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) [ 1009.516695] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1009.561937] SELinux: failed to load policy 01:09:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x10000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2c0e1, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000180)=0x401) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x50, 0x0, &(0x7f00000002c0)) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) r6 = dup2(r2, r5) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x2001007f) ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000200)=0x0) r9 = getpid() r10 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r10, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r10, 0x5eb857) r11 = accept4(r10, 0x0, 0x0, 0x0) sendmmsg(r11, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r11, &(0x7f0000000c00), 0x4000000000001e6, 0x0) kcmp$KCMP_EPOLL_TFD(r8, r9, 0x7, r11, &(0x7f0000000240)={r0, r4, 0xfffff1e3}) dup3(r6, r4, 0x0) 01:09:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r5, r3}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x4, {0x0, 0x4, "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", 0x5f, 0x1, 0x7a, 0x1, 0x2, 0x4f, 0x3, 0x1}, r5}}, 0x128) r6 = userfaultfd(0x0) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r8, &(0x7f0000000080), 0x2001007f) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r9, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r8, 0x84, 0xf, &(0x7f0000000200)={r9, @in6={{0xa, 0x4e22, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, 0x7, 0x291, 0x10001, 0xa3b, 0x6}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x70, &(0x7f0000000380)=@sack_info={r10, 0xd78a, 0x65b}, &(0x7f0000002000)=0xc) r11 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r11, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r11, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x29, 0x0, &(0x7f0000000040)=0x172) r12 = dup2(r1, r7) dup3(r12, r6, 0x0) 01:09:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:09:04 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005320204c696e7500ffffff3dd9792794fdfffefffff8200040010000000000801ff9dc0100df77ee"], 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'veth1_to_hsr\x00', {0x2, 0x4e21, @broadcast}}) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000000)) socket$inet_tcp(0x2, 0x1, 0x0) 01:09:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r11 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r11) pread64(0xffffffffffffffff, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:04 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x0) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$xdp(0x2c, 0x3, 0x0) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:09:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, 0x0, 0x0, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 1009.770810] SELinux: policydb string S Linu does not match my string SE Linux [ 1009.840838] SELinux: failed to load policy 01:09:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, 0x0, 0x0, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r6, 0x5eb857) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg(r7, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r7, &(0x7f0000000c00), 0x4000000000001e6, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r7, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)={0x130, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}, @IPVS_CMD_ATTR_SERVICE={0x78, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x1}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x20}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}]}, 0x130}, 0x1, 0x0, 0x0, 0x4080}, 0x2000cc05) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r8, &(0x7f0000000080), 0x2001007f) ioctl$LOOP_SET_CAPACITY(r8, 0x4c07) listen(r5, 0x5eb857) r9 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg(r9, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r9, &(0x7f0000000c00), 0x4000000000001e6, 0x0) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r9, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r10, 0x20, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x403a}, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r4, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000100)={r4, 0x8000, 0x7, 0x7}, &(0x7f0000000140)=0x10) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000040)={0x20, 0xec, 0x5, 0x8, 0xc, 0xff, 0x7, 0xe0, 0x3f, 0x3}) 01:09:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, 0x0, 0x0, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:05 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x0) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xd}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000007940)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00d012000000bc9c79b600000ba634e9f1ada7156b9ac8ef835625db23b23ce57a7dfc8ba4686b4607faa28b105da2583561bb59ef716c4315a139ce5e27cba3d00de66d80c6607436b7ef2efc8f38541401dccbafec32f467f6c34f0ef53ce44760e8734102ea7e4fd9d87ebfa403108ec902472a6e57e25ede8a1184ed9dcefc120c75d704304fca32855f243e967de43924006da89baa2c2eca37e601396764e969f85dc3d895b7228e4efbb5a81cdd770bdec5fe0f454f48fffda8772374ce93d9f90ab03c164a20181f20ab6c980cced7b7a8e32cd9dd6a0d6ee1de04385bc5e94cab3f5dd99988273ede29692d24513d6d"], 0x250}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0xfffffffffffffe5d, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x607, 0x0, 0x0, {0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x1, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) sendmmsg(r0, &(0x7f0000007800)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="69ac358d97ab8349ef17cf7955592d3810de058d3809808f23139433f1fa903e721c", 0x22}, {&(0x7f0000000080)="c6f50d68", 0x4}, {&(0x7f00000000c0)="22a0ba4c9a697da7cdd52cf16fdbdcb36d9f088d6fb8477813a87e1541", 0x1d}, {&(0x7f0000000100)="ab080d10d9a57d458722a63ffc64a9bc3d72d0acd013ab1bf80ffdc275c531ba89b1810af84b5b9b5c7e9cef170b79db81f112ba1bb9e8043c517720412fd1a38730bf5080ae6656d164165f9f94f5f8c9276c1cf75fe71244b47f9e5de0dd0a68648fc3b8b36c6a44271063241ee3f04fb2", 0x72}, {&(0x7f0000000180)="24e745f343d645ef7cd7ed49e6e81a7eb0e202433f7f8ba4627f0aec02f18b9b9f1a3bbad10f98e54766cabcfc124aaad43803a502ab3809914a0d58d0db83c944ca3dc7856189d74062c81e5705df855b94476e84a4157596cf30f7b1652434a68e6d08e02f6f05ceaaff24bc5bb78b0a6c5dd073adfaec8f65b346be07198b06f8d526611da84b8448daea95c3a9527ec63bbf291d6f9a96a600b1cf5fa5e8ded60087479a16bd54969c01ba02c91dcffce0964d1d8de51fbc13d5b0bd7261", 0xc0}], 0x5, &(0x7f00000002c0)=[{0x48, 0x116, 0xffffffff, "00ac14541a9abd0a38c0990bfb5d1a3c87608988ff7b9ee90b305a71d1594a58c79fb34f3fcc4f83d35d21954be67f7ee82f3dbe8a1e64"}, {0xe8, 0x4, 0x7fffffff, "89e0ac8e6ff503451163af5ad75806f96b2ff666f1aecc56ac0f347bf5c4515735b52b8c27628004d3391bbd4dc866f12005123cd543e0eb9e4558d885c2569b5e88f02fd5b295aad45f68f9c8908958c5a1d5ce348e3d103a05f98005d01eeb2c2337f045592d016c15a2d24b0854a4cd6b81596b7ea1a2c9886978370f1408777c71c7439a53b72c55870b5ee743730c876910fc5adf077084ed6c0f0a08d6bd295187879692f874e64c5d01a78b5b8670ef3cdfb48ffc57dcdee225957f7061d566933274393a75f0482527fc98affff654324514"}], 0x130}}, {{&(0x7f0000000400)=@caif, 0x80, &(0x7f0000002540)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="48b74b11d5a763b11fb9f68a965b1db4635b9980f5c04b05b3fe67d5f000b7691a4e3ee6749351febf540f47b227763b729f90466db42c21c4a12c4303287f655be713b8eaead3970b11912ced6d88dcd26e272cfd93b53a4189fc28eac5e55f4f0beb38ffd828bc65f46ddabc13db94d2ef59452a500d8bab0ef7b7b6db4cf806c6ad09f1d7b819da11ff141bb6e06d1b51b8d74a58104e", 0x98}], 0x3, &(0x7f0000002580)=[{0x108, 0x103, 0x20, "da9ff94e6b3b311f6654cc71fa0b4c52970f44c62675ec10be948f75fcc85ed256be494262f6901275c858521178e88c0830280bce44c9b36bfd08cb3965c5892bb6d776f2d42bff629c85b6b38e5a30d6d13aa3bd77953076f6bd1fb1c2162f90d3d2435f0189b142ae0568cf2bbb195e7f078a9f14ec1d3067a55089e2a3e8fa9113ab17c9601040e5b464c267ad57e11d079f5b0a5bfee68154fbbbb22fa5e3e396f863ec885c01fb24d9a21e8e23dae5058c78073026c254784a4e524832f6467e958276ce81c20b96d862b2af04be8aaa94c54b31110a0119ecf4e47ff2df7334db1f59df5dbfd343002d86d986460759e1c4"}, {0x1010, 0x100, 0x6, "0db9fe8cc779dd66187e55a61320933059825135e47b2d5e8eb65040328b534cc832ec3a8cf6acdc29118cb53201b19059fafc3d21ddbdc572c7d0b271a0ef1262c50f6b936819b305136d8b676e3d193b75aacb67b4cc19cd70fc32287a194cf69811a5da89efa45493731961d63b66e1818aa04fb4ab63a4fe58e42db47279ed1cad4480d5a70550dc7892d9e19349c40259a3d766253cfca90ffd65c16bbf01848e9d817c761f3958158a59eac89a793d2c9ae2093994ec0e21b41b643979abd83e419e0c6ec87c2c7552e0203e53ff9c1094bd7cf70a1f80815fa52014da2640302a3bdb33ff5e32cea24530f70cfe583b5b48940944b2f5cae5d42d1af462631975800dc2acfe2ec2de3b1f452c9a6c090a770078b58fd4e44a14eddca60cee55408e2aa67e6c1a625e37ea412f99c139b3e895e7839542ec9eb5471d6871c6164ef5f92815d5c1f8284187f03a88b34cea57dc14debeedc1993bf30f32f4da6ff936a3e5ec7f213c6d2d33c66be405ddd8cc50750062e822e91529340dbda0cbcd034645bed96c57abf5a59dfe811d45b813c49f5a704ee543cb3fa71c757ad9cf96ac92249e992fc5b1f41b9c95d3be315bf812a6952f15343b1b01f82a4d1070f9e492ead69b138984461f52d82bdfc8e0b2f98bf9e4d1c5dcc3c4264d91afbbac86dc074a0535e6220dce6cbc4347d085463631e6df87ca5ef8609cf0e2ef33be341c6646ad19a387f3bb3ece4868a6ee883de86e52a60c2d8e677822e0eb9f8cedcffa789a6bbcadc79de1659798e905da5bb7886e334f521c69340e0df514d2427544426886edcb3b21a4af7820f7130e421b962bffef84a83bfef4873f136434432c5d1494d4b9ce2469b445105374630273a3cf616ef880808f9dd13f69ce782c9f12ee9e54eac7ba8d08b9ddecaac00bb786aa1fc84ce4b700c49189d8212c78a46eddd94db10858e2911f45418463c55f959acc5740ca411134a77999bb4a9d66390948770a7782e37ab5ee5f24a54736e92f7f403ef6bf0c6f85705f9e87b84a687176aba76f0d8828a6358722d1c2d9b159039aa88ecccff04ae1c84dfb656f8afb6ae0b52793d9da1c7cd13cf8c9097467623507c06c67160d8906b35c51b914e3a5872c6be167143375a81b84f8ef7bf9fa10ddc1a1c32196c1d4c438dab9ea5710797f4a28678c49683ea8db8628390d4e5a1ae6308307c9eda005d5bb414a58093a0ecad4d56bfe91b614ddead200415fa8c2967430570a869f7e1ae16e8e052e99593aaf1a50d68427ffb5fcc1e2ff8d549c08302b541f08d3e6d2d6e0787ed3614f3d1f40b3107ce0b5350a37922f771441c13a4dbd00187ce4694f4580d107f98b07352517117f45e9314bff4f5cf25ea03f853f834583f1a5696321a340da74e6dcf5412ab43e83243ee229984eb541ea4e8c82030176cc34b4f66173e01fb48fc42a62a2af7c3cc15fa1fb9fa030a6fcb61fbe26ea8c76b5cfe39fa487f1e67b26134593f6d569b9ace84a9de5a9824af0922ef9c4ef222ef88b42f4b0e01d1eab2e5e076966461bfb6ac09971216f71e0e7184a7b7d2673c541cdd553b0d64dd624ffcb6f6fdb2943bd2994f06436c97642f7b6569d1ea4e3d8626d6bfe0c6f5f77d9c7eff48b7ad9d26adcc15481b5c26ebe2746eb576974fa3f2a68ec5990bdacdfa374171be229ee6c0c786d570a8b3b13c7f224e015f861684c270430e2652aef92ce548ddfe6ddf215e240007a0c96d3f7577b4dbd16d05eeeeeb1dd255bcc8df961322eb2b021e9cbc20927599ddcb9d3b38d5fb09ce35007719b674a43311da24942fa2ff9138bfc3f38607ed0d65e091b4837875ec5db05e8173b1d7e999974144ab01cfd05cccf23c82fdd3b3382ca035574f171f651bc149050f25779bad52e4b11f3f1d13c9cf84b88abea7a1ea9e831b341806bf5bb0352d69604b9c235c64cba1f3cceb5343888b897ba3e3b0c557622387afcd10d3a7891a2aadd572b2cfeb8a29cd2535c687cdbce1123997088c4b9c45493bdc1ed3ad4cbde2afa088f859332f09c344c79c30640c041b4a991151cf19d6b38c416b37c21df61a61158a939bd00ca62a9abd0c7c6579682fa196ed2a8c1556bf8437b993a2a26e7aa7b7e7a03bad7b25d7b424de6558621ad0234180188919a689e23596478de8fca4f944295bbd4767f7e86dd298590ee1ebbc527647f3f945d0439c467b4f6ed7089603168d25d1537f746b87aa2be1cdff706f019801ea80daa98ae0cd27c5d37098779b3d39a8e9f72557b9f7eda7cbc4cfa7fc5ea53451dbcacda4cd64c1dce2524f213e37c0a95ecaa4e8db6c2e0acc13d028902dc733d261f04deaaffd131e2bf2fcf21c59ab7b6bcc28234d9d71c1a4e2db02ddfc7043c859a87fc702a02d6cfdfb42f142d2fe25dacb4b2f7747685b6f85874be7287fc4f11dd65bf0c24186c3f5faec7ff29294d7cf264d618fdae774d1c956237cea7b840273e315e72eea4e8ac7a2b322d4dc5315ca9e84d2e95d3e8effdf9021a49d5d20a93352a95c41d1742f0f59d12d6f52de59f8ba582ef2fa93af623209d84af6942547523bd7348a50d427254769e04b4d0fd88ed44ebd61e4838304c03e8d56c134730b77e1126b8a13b6aea6a17d1f14ce88c4f11c46938169623a2003bd9a0bed09c7cc5ff472a79d8754f85551c2bab23355638165cac51d8be81f3ad27c7cc264f37f5f7715aff8ecfab970555fd3f112dcad58757b0a0c67282ae4807af1afbefaf05672c421f826a7cc04fc53185021b1912338a10601f24d03081b9f3b06e742c3bc33fd534272af2ab10b5e6cb1ba0cb629a3ba5b95c80d439a2baef27d0bc0244fc6719eaefe9bfa04b8387514ad7a1e736a7693d4037ed206822911086a4f1dcb32805d98b32457bde5015924b47debbabe00eb5ad29b9b4c652170c46469dfe2b28eda90559cccc6d4b76c0d8d66f3c2b46f06662ae6a98f2383fdef6e53269c366dad81feb8ec74535bbc29a68ddb9b22a284132d5d2888e70356a2a78579ea507fef3ea0ca320871803254fbfbb378b26aba9b96cd353bf1a83e0a110a5df9948c47fafeef6793965a26a8b432f2efbe78bda1e37dd552fb462cfbb6f64d35d010a843b5512f404c3a62df578acfb00e7f12c72c887386c2a1207d21fe93e37269df4dd2ababddbcf46a9734f21ed78c5c9d8109a6819cb159391cbedd2ae21c90bc67ff7388af6653d2401a7d81d92291847cab7edfc25e50b84c174d978b6165b99526d66d07d14d74407fa1a7693ab817a98feba42caef2d7a52586bf728ea40bd7cac53e30143457be35e434c757945830c3d277485ad72b4f236485de114f26b9295dcb75e2394e8c74413c83cac55d8d22206d79d17404ef7c5fea1d7ca6c1836d0e8a87ebc55d5f6cffb47ce4e41f5160baa28d0f05b579b737d2e803034ee1b0de3715873ea81688e5491b6b890fdb0fbf1de4fa579e99b42c14155b488c64408a2f42721004a5c0b80293d9517a1a8dd564dcea58277ca713eab422a61caa1c24ddd5598d5353c2858009ae47776b35f1e67e4a39c6df9aa44195fd2c557a8bc316d6ec854a5be96c25905d269d13801a68092a57f3814b0ad4049d4499bb146773dc1566b0d9fda870d02c7777bbe229ee88970c545b93435ddb669e0a8a58ba9cbf7b1bb481b1dba0533cda49c3e51e6f59ef06a1638e6a340b48f64356cccdd72f80cffbc8c931d7e054b5232a380b544d9ef341a8db821c7f04286e10a179de428b2aa8b96d681aa82e6801941ef84aefb95c99c1c93ce276fbbf8474ee3d7177346b1342d0aafa8747197979c85a6d5a99752e1669bf718f79191b0e83ec237140b68145278fc746b7df5bb9c179131655d8b2ac3b4aa25303b8802ad4bfedd66d1cbd23786a9c9d2eed41a3774150cf7d8797745e208f1485e632664a9d857cd860d27b128d94001ebade48f86126122d09810152369205a0f56a5274af6aa4439d374b1c0acae273b00bc63397fe468d45e3d2d8919bf349fbb54a678df79b7d0193995da22ada37f42f0420da474e08b438635edcbdcce3e94249376dcdc5adb156bbd10033669ccd62eec5ac803580390c131650bd49561e4a49f09503259b0333b15a72fb47271bd1edfc45a68d3552dfce401cea994c2a4fdc695d386f14011adfb60df43a0b53e058575585cc5e6faa36b756891bd67dc292c783d04f93d801a267a6334c44c6963d2ee16604e555a5fd9501ad43fd8952b8c84c00fedba3381fabefb787472309f0d5874cecec2286645b4b52afa06dcef281be66d80e25ae2059a73bea9d85c1322568828fd4670a86a73692ef58ab1f1ec317a3982221bf41c954da6b572b0fe837d98c450c7b09de6ef6ceed88905a27eb117d47d3d099b658589b3a3ab156eb3c4dfc41c543e13e4daf4818069d7eaad747b123d3431011cf846d1ae3810cc2639f76e81da14291c6b504c0ab368887463978a5ac310309cb9730d9b0cdda2c63ef1daa21ef6ec6f4a85e61d531a62a9898f511a8e9e491a9e070177395fe24eac8a71775c564a939ea094d204eaabd162e85068c4a3873689f46ddc0f9a7fa9e1bd17f42d580dd2474154764a2e747b70d23e13f9e0f0365afb9cbabff2d71b1133bca5b6574f15c8e66b346dba7e83e46fe8157ff65570f45d2a9b919d7975cef08f05d2c4c07dfdb26b503a894451e48d9d33655ac22167e8d5acea454e097d62e0970e4ddfa8c6bb7de23e745e4a825bff961b9ae82390b93eddaca33d1793be0fadf6b44f7d6e76d11206d27a188c1cad4b2a7cf03bbe1bf56c2d4d6670bfd59de3d54446258618a1e004de37171ce43ca7544fc5e9c81978870b6fcbc2f448ff5eb8013eb9b578a7ad5760831ba6b7a9abbc588cc792f829655f435d6f4dfe6fdd5d14d436e67bd63f0b5df2592a88e54d8cc8145a96d40a60a933d7059a654054f986d4ec425d89cfc1b33989fa1416c827696db502fcb4c633690d39d5d8a59440f5c4f20404905f5ebdb86dee9724fcb76452b0f50c862073733ff4db4135ce102262cbd9861a9177bacaf2b2d3eacd86ecea3be13277b8b99e5b326745dcf28dc534133b3b27ad4115d2d2ca8d509aca90489ea43f2ff012de82b6be5129c1be81df9cd9bab345ba9ccc58fe013ef107d8baeaf02d20aa6e1af4d0a0b51af3bbd3e663a5ed107f1e1f3a98ebf958bfffc960dc732dce13910261b5b0e1350458f235b555b7f2018daeed7dd9c8c53d685367c342681b53c2c61448fb6bd4fee9d03d66bc1379933d4af1d2ea603ba40e5f31cc7db7290e50d8832c50990abf61b5e480aae3dfbdc832a83b9d24c0046529228e604ff995ac647a777bd4b735bf14d9b83be81a08e0961297c827f23432891063fa057cc9be410b65f7600e815301f7f15089df8b0b1e44a1dc2caaf9719759ebc046622a2bf764acafc9c7182694bf327d35a9c2e62d19cb05a658d5d27efc8f0ed8f5e79f1931e405863206f21aa611840f739daa91616726a666a9b814f2d4f9035544e334119a498d0710b6c856b89d5b7d5b33b26bd95d3de8804e7df44d4b7a99fac56d29b8facb90670dde722797f10f0d88ef4ce411af77509e4016c56e94949fa5cbc6813be875bcf2b8d0d53a147b22263cdea165a8b6fe7ad90cfb81b180a6e0a3bbb0a8884310e95484b8e51e982eed87ef9f118d415e0e279fad99236beb2d94f49c839c837805a3e2d70607fc50f62f7f212f257f738e4bdb6bb165"}, {0x60, 0x114, 0x8, "07c0f6dfd0458726b19a36edddad9b49685b8ec65bea88bfe223df071d81a37f46849c48491524de65815ec0c592ee819449c12e32fbdc2bf366eea4ab3a99cb977000939e3854a457"}, {0xb0, 0x117, 0x3, "1d0b2fe610e9853da85b7476cb1ae0cb5a1494cdffad26c36e345b8dfca00337ea141437f98fe5d31f39307546839030887228da10983ff3454b665bf8557c1766c7e122eb0ba60a353a7136d17dddef7f22d94f3b7124c48379da7d94ada2c1025bbee93c1b0c7f56809c71d1603db1e891319fc61b3ca7aa004743da4930f7e5b43129304f3d9f814691995044dcf5648c24f99a1b12cd6449da"}, {0x28, 0x107, 0x0, "0b787a8c03236943cbb1977f2af88bc53d10f0bfd0dd"}], 0x1250}}, {{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000003800)="08df9560aaddebcff79d0e502ee80672a519b2ba671dc003c721e6cca2d4e4eb41dfc28858ddfc3377fb51035b4c85aa493adc733d8b2f1696df6d23dbfb6a061068f695b0bc7e808aabd6eb62361b25fd963a05558b626a5255e60e2506a012bc3fc0c4645ad58d354c8222bcd2816d93d6fa64135aeb79770f03f442129f097e5ac7f4417c4579785158759e660126da648cb44d72cdb19ce42a4ac352d7f2d566bd834c0c6e528b8a9045eb65", 0xae}, {&(0x7f00000038c0)="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", 0x1000}, {&(0x7f00000048c0)="750c7f3d1677", 0x6}], 0x3, &(0x7f0000004940)=[{0xf8, 0x9, 0x1ff, "b056449d4b9f66958713f901adf8309f0169b3ccbe6df725fabc75d38994281c1df3414fc55c864148194dd83f3afe95cac0d95b5699bc19622ab9efdf60cf9d5d4bf648c5eb5fd066b8eaa801e678b91102166d35e9f44c685ac9c10c53b27ceca5b37a8c74df7ab45f27a5e97f3fdb09d06d604d51d664c8f066c5c907994ce22becc699772d88eb5de0f9060409ed9406db6479bf8c420d30bcc06e4e0151dc16430a60b85a604c457089c0068d5f72ea9f43cf725f070c2a3c8ae9c5384076a1546154ca9bd8b70bf1db0b4765b7cbb6b6f12f49cbc99f623eb6851614deec6b9525"}, {0xe8, 0x29, 0x7fff, "481579a87d9f409255eb159934fbc7ef21eebebe0b9f7118e704a99f11a56e14919202375e07eecebb89e4a7ba9aecc23cc3c445cb01d6762389e249a81f2f29872892c2c31ce828425bc9e0401db56dadf80947174262e15164164a26a4543ef9440013060ac23f99e18c1c2e6451bff84dfbb282d9c6f7d38dd73d8669871645c57870a6e4651ecd4a867f6607df5d3e70add544d2828bfeec8e85ec28a35cfd1e7fb00ec5d21c2891246942583e245441ec8cfd37bd7d638c5e598a62ef91b864c1df38e695ed261c1467b0e773ce2c9a6dc2dee61b"}, {0x38, 0x3a, 0x2, "fad811b1c29e660c1abb41fc14273f0efbc887633912c47fad561b316786b4feb83f7c5e0c"}, {0x40, 0x29, 0xffffff38, "b71f49489bb0cf9c469da1e76952d9d5c551a9be94b6dd9e0d9e49bd0c6c2fc650a4d608321b3ab3f65c"}, {0xb0, 0x116, 0x6, "d6531f07e9beb59f6c3ffe743fd9c1f223c8c37232b1037df76ed51dc5547b021cb2db26d34b0a55aa83978fa0799b92d5399a8e844cce66ba73c50b68aaa8d4836ca7166b65a2867b58958ad4f7e72d7f6ca589c17dfcd29f3799c747915e35ad44eecbee558985ef5345e46a10de2c8b07d0930be1fc69403ac176d5814a9f17472599b10c064f954432f135beb39af414cc0693a68cf144"}, {0x1010, 0x76b239992a7ddb61, 0x7, "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"}, {0xb0, 0x10a, 0xffff, "ffa66a2bc6e8b109698752d53cf160854fe05453e891994c285bd6315d84a85f554eb8ecc24215f867db11edfd57b9e3fe46b12f10006dfd0415284762d75f4fbc87e54a3f63600007b78ce3ff15cdfbcd7e434a283e6096a95f44ed4a497c3c65338f158a6208a0ad4a3f7075f1cd0240b799eef81b9862a1594840dc51dd4dbf127b2f0e2996605154f1032b90d59f81073991904b3578769cd33632256b89"}], 0x13c8}}, {{&(0x7f0000005d40)=@hci={0x1f, r5, 0x1}, 0x80, &(0x7f0000005e40)=[{&(0x7f0000005dc0)="ce694dbad59ca5232a", 0x9}, {&(0x7f0000005e00)="3e9dbd9d633b4e5dfba10087a7a4b3c0acd80f", 0x13}], 0x2, &(0x7f0000005e80)=[{0xa0, 0x970ac89a1391ac0d, 0xf8, "8a33ddfa962f3a276947054f2fb6cc71249c7a9c2aca2321aec7561ad00052c6c82cdfce74e6401940ccf8fba598d28de9f6aed95c487bfecc177bf6e846b158e04cac546138c69d0c9bae1096dbef6ad6e62d067389be90a5f5e4454614037f542d9ef69cc03163f77f5b9f204391b48b18bb2201066a19df19da89dd6f96a5704e32f83aef54cf08934c3ba7"}, {0x48, 0x3, 0x6, "6e1b2864752209beae1a3423a860ea3da2043f86c2be04bc097db0e3a3e8802de51f92e90561beadb8453f1980fe6ce93d3b18f2c8cb"}, {0x100, 0x10b, 0x10001, "6af4a3acc93b4a8ad1f40d0aa2468c0e93eed899c2ed6e8340a0a13421221af5e7e96cd0141968791ebf7b0bc98c18a118931ba18a451d5764ecf1a19a797d072544994a132ddcc3f2f64269fbad546624a4ce444225e82e8f122f700c25c77da866bef72ddc2e0eb4362b0f76447cd6227df4125b7d473e26e6c4e5a5a072915e901e23969adae882a2ae579fe709190d7a259cbe603a4c099c8fd74a7ef01695020a5ebf200b0742f6f6909147c97f56f11caabf823c34d19d3b089693f7247a4e6516a77b5810fd6be3ca03de70dea1f8e777bc3c9ed205e696026e088eca2269d7b06803a616f557a4a384f8"}, {0x38, 0x103, 0x507b4495, "0388c6bd0b38a58721fa17c70c8014647843c4ea6764cb4981f1a17e247a0be52d"}, {0x98, 0x10a, 0x1f, "61002f87ad4ed18ae77864cae4ba016b2567a90a896e58060ec0de462dcbc993dd19b8b35a3cf311f4aee605e9ca82e71c18987d3a4b110388e01ca13dc6e9b536b7e231b9fdd6b772fdbc637d7cc83b8702295bdea56664acb0d10cf2ac8165902ec934d5563f02832d98bfc165fd09306a047270e75cdfd6a6046b33467a664a6887d2ef"}], 0x2b8}}, {{&(0x7f0000006140)=@ethernet={0x6}, 0x80, &(0x7f0000007240)=[{&(0x7f00000061c0)="86798d7bd7373dc9fe21bb03d1dd39ea182d6fe78e5134921d1a0416a0a360c71049f2735ef525856e58fcd035fd66f2a18f4c1f7eae8293d36a0a1030d4707f2d616848aaae7ac89fbc206cf947ae2e5cabc7f3b0b240e0ea3bf006e2fe5e8e9ae75eed4fdc86d4072f0cd5a1ccdaf523", 0x71}, {&(0x7f0000006240)="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", 0x1000}], 0x2, &(0x7f0000007280)=[{0x110, 0x100, 0x2, "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"}, {0xb0, 0x105, 0x7, "8404f558c43b1ac9bfef55b609c036960ae4cf326a71c70892699be8382fed8a5a0d254ed4472e7beea89b86eeddecea917bdb0d57adf7ad2323eb6d6dd94c894f64ea756735dcf55427cb3922dfcebb68cb959199ed6794237cb15e0d34a054ce79d6a31467fc58f33fe4d49b9e24e38d4cbdbe78471b418571d8c0b268e750736266689aeede0d78e146fdfd6e2a818e37b59bfc3b70ce6e99a9f011"}, {0x110, 0xe5, 0x1, "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"}, {0x108, 0x0, 0xfffffc01, "bdaa29a27139fd6cbc0105c2d1920523d9d9ab454d6a2fe3b4be19ba4427f0e78797ee758f061f8be780a254838411c7511be65f6bff56cae8e6da071615107c0bb6e81aed67f7dd8db0ece1dd93e763eaa116c8c0a77705417d384ceece899e9e6089381eb67930f6b721daa43742e141046fde3b3b1643940ee6e5b402ab93d9a96fb980dee2eed0cd6888775deec6dc1cbbee7a3cd45e772b84b68d1e151b01e48cba6cb72bde71e21091bcee8c6cac57239caf539d5ae49a2fff6f60f4eabff3d73787107fa96a93c64726819f07d1235b993dc5e78a61dd63c4736fe20559075836f2f29ee5d364cc289c9fa91761c3a022babbd2"}, {0xb0, 0x117, 0x200, "d68a512b69d5f70474622dfc2412ff309b7a31ec65530d746729392df302e7528d8b4b689e0d364c5170e0232c575606881e7f17c0d252c63f735a8595fcdca026a97e2ce028e2af2b3e531dbec30a9bb8c6a963aee450626ba7c3854e8d73f639f253e34168859a69c1d2497b8074bead7f31b4f81448341831445519029242a8bea1b2e1147b3f0fcaa7a786fd60909493c6dabb5a261d0ea3ac7201"}, {0xe0, 0x11, 0x3, "b36b44bf886a1ab7ef2ff44fcfa9525b13b8eb1b4e34e535c5a0b56c58240d8241c0a37b1b92758ee0099153321c16c7627a8ff9c8e655a0b87318feba7589137429155356fdd2231e5a580f2cebec8050874a9783f8a795d60b87e4b2e2b539b49f5a50dbb654f642276657cfd39ea14277bdbb07725c885088142b463f79b3976fe2f9b63ef7110d0b09915010016a3c5a6099da53a9fd5e634dcb262d7e93296d6978c5823f94821cb6742f405750871faf1b4ada68edad0cf2c31620afe91334feace75e2839b8"}], 0x568}}], 0x5, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r6, 0x541b, 0x70e000) 01:09:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(0x0, &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:05 executing program 3: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@mss={0x2, 0x53}, @mss={0x2, 0x7}, @sack_perm, @timestamp, @timestamp, @sack_perm, @window={0x3, 0x800, 0x6}, @window={0x3, 0xd37, 0x8001}], 0x200000000000018b) write(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x17) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) 01:09:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3, 0x100) ioctl$TCSETAW(r2, 0x5407, &(0x7f00000000c0)={0x0, 0x6, 0x3f7, 0x1f, 0x18, 0x0, 0x1f, 0x20, 0x2f9, 0xff}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000100)=0x1, 0x4) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000480)) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7, 0x40000) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xfffffffffffffed9) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x29, 0x0, &(0x7f00000002c0)) r5 = dup2(r1, r4) dup3(r5, r3, 0x0) 01:09:05 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x0) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r4, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000080)={0x800, 0xe2d9d14636b73cbb, 0x1, 0x1, r4}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)=@assoc_value={r5, 0x101}, &(0x7f0000002000)=0x8) preadv(r2, &(0x7f0000000400)=[{&(0x7f0000000100)=""/40, 0x28}, {&(0x7f0000000140)=""/58, 0x3a}, {&(0x7f0000000180)=""/227, 0xe3}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/142, 0x8e}, {&(0x7f0000000280)=""/3, 0x3}], 0x6, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)) r6 = dup2(r1, r3) dup3(r6, r2, 0x0) 01:09:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(0x0, &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000040)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0xee00}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x29, 0x0, &(0x7f00000002c0)) r4 = dup2(0xffffffffffffffff, r3) dup3(r4, r1, 0x0) 01:09:06 executing program 0: socketpair$unix(0x1, 0x6ab067f6ebb5bc98, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000080)={0x3f}, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r2, 0x541b, 0x70e000) 01:09:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(0x0, &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xffffffffffff0001, 0x400000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x5, 0xa, 0x8, 0x9, 0xfffffffc, 0x4, 0x80000000}, &(0x7f0000000140)=0x20) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) read(r5, &(0x7f0000000080)=""/60, 0x3c) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x2001007f) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r3, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x9, 0x4}, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x100, 0x5, 0x8}, &(0x7f0000000380)=0x49, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x100}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r6, 0x10, &(0x7f0000000440)={&(0x7f0000000180)=""/186, 0xba, r7}}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x50, 0x0, &(0x7f00000002c0)) r8 = dup2(r1, r4) dup3(r8, r2, 0x0) 01:09:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r1, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={r1, 0xf95}, &(0x7f0000000080)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r2, 0x541b, 0x70e000) 01:09:06 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(0x0, 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:06 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x90000, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000240)=0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r2, 0x5eb857) accept4(r2, 0x0, 0x0, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r3, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000000)={r3, 0x0, 0x7, 0x4, 0x2}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x2001007f) write$selinux_load(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="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") openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) 01:09:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="4b085b2933a302781fbfc2b643da1df7eccc81350d5a7c588872130fce9650507f617d690da63ba4721826266a976f1556d4bdef04229705160946dc8f40e247a396e619168f625d90b74598218ab57e9e3160879a87fcdd39d0c80f2b922d356c7f3491d4e6c3913a114a5e08818a67f5a80f97a0cf82eab7304d4789f8e45adea072f3d05d1af3d50e7c7ee79d690a80ed42a6d56ad0622056c204ba892b73ce6b4dce6c049c622d63b31bb61b97bf648d718683049863dcc78e96bb1a3ae681e1aa8d2a1c6d3a7e01af7aae009c8be1237bb96090e5ff25523d85eff6fad3cd4d4cff864eb7d32960dd76f301076851a3e7a6752f48e2d4706dd3807674", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000040)=[0xf8000000, 0x5]) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:09:06 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(0x0, 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x2001007f) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x2}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x2001007f) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x2001007f) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r7, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000040)={0x40, 0x8, 0x6, 0xd39, 0x5f2ee540, 0x49c2, 0x1000, 0x7, r7}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x70, &(0x7f00000000c0)=@sack_info={r8, 0x3, 0x81}, &(0x7f0000002000)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x29, 0x0, &(0x7f00000002c0)) r9 = dup2(r1, r4) dup3(r9, r2, 0x0) 01:09:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x50, 0x0, &(0x7f00000002c0)) r4 = dup2(r1, r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x12) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000000040)=0xfffffffffffffffe) dup3(r4, r2, 0x0) 01:09:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:07 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(0x0, 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1e, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0x10, 0x0, 0x4}, 0x10) write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000380)=""/79) write$selinux_load(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r1], 0xfffffffffffffe0c) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:tmpfs_t:s0\x00', 0x1d, 0x1) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0xc, 0x0, 0xfffffffffffffffc, r3, 0x0) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="8a608047ffbab357cf206964ecc0e25d3d985402635f494030666cfc5ff155cd52de2d89606c466c5800db9c48da6caa2fdf7b894421ad", 0x37, r3) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000100)) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f0000000140)=0x81) 01:09:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r2 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r1, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r3) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r4, 0x4) r5 = gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) getpgid(r5) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r6, 0x8907, &(0x7f00000003c0)) r7 = getpid() fcntl$lock(r6, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r7}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r8, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r9 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r10 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r2, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r11 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r11) pread64(r10, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r3, 0x5eb857) accept4(r3, 0x0, 0x0, 0x0) sendto(r3, &(0x7f0000000040)="7a49c5c38b405968857aabe1252d8f6a986a1a8a6a654a54a2698e81760ea9032857c640c29f00b05812bff93ed4dc2784252cacf78abc1545acee878b03663594d743f4a2eaafb7ed0e2079dcc5278fb4712bdbe7e985db922a6538dc17bc1d8965408e2be37610b2", 0x69, 0x40, 0x0, 0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x50, 0x0, &(0x7f00000002c0)) r5 = dup2(r1, r4) prctl$PR_GET_TIMERSLACK(0x1e) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r6, 0x5eb857) accept4(r6, 0x0, 0x0, 0x0) dup3(r5, r2, 0x0) dup3(r5, r2, 0x0) 01:09:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r2 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r1, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r3) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r4, 0x4) r5 = gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) getpgid(r5) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r6, 0x8907, &(0x7f00000003c0)) r7 = getpid() fcntl$lock(r6, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r7}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r8, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r9 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r10 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r2, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r11 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r11) pread64(r10, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) write$P9_RLERROR(r2, &(0x7f0000000040)={0x16, 0x7, 0x1, {0xd, '#eth0-]nodev{'}}, 0x16) 01:09:07 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r2 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r1, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r3) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r4, 0x4) r5 = gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) getpgid(r5) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r6, 0x8907, &(0x7f00000003c0)) r7 = getpid() fcntl$lock(r6, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r7}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r8, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r9 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r10 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r2, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r11 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r11) pread64(r10, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 01:09:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x29, 0x0, &(0x7f00000002c0)) r5 = dup2(r2, r4) dup3(r5, r3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000840)=ANY=[@ANYBLOB="010000b4ddb7726d608f6ae6c08538fb9860ccb0a09420232d678657aae148a492f02503082ced80efce7e46fb30a29686050609abd814a1a7f4ec547da84bdadd472df1780df1d479e6078bf3c325458e433c790676b44509db138b33251b5d9bd5b892c7f8d9e5551338967262ed77e46d11ef23cb309a487e14c0ef6e3a134d3bca5efe1743fbaa8b590600d814a987f97a818d0b4202b296ef32f60a43a9fe93cb483eb51a8f4e01a4623075311f5fe7dccf8e3144b06696ea7eb1e0f0d1a5293126466054e4e811ad6f62678e0ab0b3d5febda56101347f8d8007291c0db2e1", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r6, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={r6, @in6={{0xa, 0x4e21, 0x400, @loopback, 0x9}}, [0x5, 0x7, 0xa, 0xd9c, 0x0, 0x5, 0x7, 0x4, 0x3, 0x80000000, 0x101, 0xaa9, 0x4, 0x7, 0x400]}, &(0x7f0000000140)=0x100) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) getsockname$netrom(r0, &(0x7f0000000340)={{0x3, @null}, [@null, @rose, @default, @remote, @default, @null, @remote, @null]}, &(0x7f0000000280)=0x48) write$cgroup_int(r8, &(0x7f0000000080), 0x2001007f) ioctl$BLKBSZSET(r8, 0x40081271, &(0x7f0000000240)=0x8000) setsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r7, 0x8}, 0x8) r9 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r9, 0x5eb857) r10 = accept4(r9, 0x0, 0x0, 0x0) sendmmsg(r10, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r10, &(0x7f0000000c00), 0x4000000000001e6, 0x0) recvmsg(r10, &(0x7f0000000700)={&(0x7f0000000400)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000600)=[{&(0x7f00000004c0)=""/121, 0x79}, {&(0x7f0000000540)=""/183, 0xb7}], 0x2, &(0x7f0000000780)=""/185, 0xb9}, 0x40) setsockopt$IP_VS_SO_SET_DEL(r11, 0x0, 0x484, &(0x7f0000000740)={0x3c, @remote, 0x4e20, 0x3, 'none\x00', 0x12, 0x5, 0x68}, 0x2c) 01:09:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, 0x0) 01:09:08 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, 0x0) [ 1013.777968] syz-executor.3 invoked oom-killer: gfp_mask=0x6000c0(GFP_KERNEL), nodemask=(null), order=0, oom_score_adj=1000 [ 1013.844408] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 1013.862464] CPU: 1 PID: 15881 Comm: syz-executor.3 Not tainted 4.19.75 #0 [ 1013.869460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1013.879032] Call Trace: [ 1013.881673] dump_stack+0x172/0x1f0 [ 1013.885325] dump_header+0x15e/0xa55 [ 1013.889060] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 01:09:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, 0x0) [ 1013.894196] ? ___ratelimit+0x60/0x595 [ 1013.898131] ? do_raw_spin_unlock+0x57/0x270 [ 1013.902563] oom_kill_process.cold+0x10/0x6ef [ 1013.907086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1013.912646] ? task_will_free_mem+0x139/0x6e0 [ 1013.917165] out_of_memory+0x936/0x12d0 [ 1013.921169] ? lock_downgrade+0x810/0x810 [ 1013.925339] ? oom_killer_disable+0x280/0x280 [ 1013.929848] ? find_held_lock+0x35/0x130 [ 1013.933928] mem_cgroup_out_of_memory+0x1d2/0x240 [ 1013.939060] ? memcg_event_wake+0x230/0x230 [ 1013.943533] ? do_raw_spin_unlock+0x57/0x270 [ 1013.947953] ? _raw_spin_unlock+0x2d/0x50 [ 1013.952122] try_charge+0xef7/0x1480 [ 1013.955863] ? find_held_lock+0x35/0x130 [ 1013.960392] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 1013.965278] ? kasan_check_read+0x11/0x20 [ 1013.969503] ? get_mem_cgroup_from_mm+0x156/0x320 [ 1013.974381] mem_cgroup_try_charge+0x259/0x6b0 [ 1013.979006] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 1013.983972] __handle_mm_fault+0x1e50/0x3f80 [ 1013.988410] ? vmf_insert_mixed_mkwrite+0x90/0x90 [ 1013.993296] ? count_memcg_event_mm+0x2b1/0x4d0 [ 1013.997991] handle_mm_fault+0x1b5/0x690 [ 1014.002082] __do_page_fault+0x62a/0xe90 [ 1014.006170] ? blkg_prfill_rwstat_field_recursive+0x100/0x100 [ 1014.012138] ? vmalloc_fault+0x740/0x740 [ 1014.016229] ? trace_hardirqs_off_caller+0x65/0x220 [ 1014.021275] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1014.026440] ? page_fault+0x8/0x30 [ 1014.030012] do_page_fault+0x71/0x57d [ 1014.033832] ? page_fault+0x8/0x30 [ 1014.037389] page_fault+0x1e/0x30 [ 1014.040855] RIP: 0033:0x40cd37 [ 1014.044072] Code: 8c 02 50 bf 75 00 48 83 c0 08 48 83 f8 48 75 e6 49 63 c6 0f b6 4c 24 5b 48 69 c0 a8 00 00 00 88 88 c0 bf 75 00 e8 59 67 ff ff <83> 05 c6 32 55 00 01 80 7c 24 59 00 74 0b f6 44 24 18 01 0f 84 e5 [ 1014.063003] RSP: 002b:00007ffe69e38150 EFLAGS: 00010207 [ 1014.068390] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000459a29 [ 1014.075688] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 000000000075bf28 [ 1014.088444] RBP: 000000000075bf2c R08: 00007fb2a06d3700 R09: ffffffffffffffff [ 1014.088453] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf20 [ 1014.088459] R13: 0000000000000004 R14: 0000000000000000 R15: 000000000075bf2c [ 1014.135159] Task in /syz3 killed as a result of limit of /syz3 [ 1014.141842] memory: usage 307200kB, limit 307200kB, failcnt 22299 [ 1014.156375] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1014.166046] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 1014.194455] Memory cgroup stats for /syz3: cache:84KB rss:207608KB rss_huge:159744KB shmem:48KB mapped_file:132KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:207612KB inactive_file:4KB active_file:0KB unevictable:0KB [ 1014.295034] Memory cgroup out of memory: Kill process 6866 (syz-executor.3) score 1113 or sacrifice child [ 1014.311046] Killed process 6866 (syz-executor.3) total-vm:72712kB, anon-rss:2208kB, file-rss:35788kB, shmem-rss:0kB [ 1014.326857] oom_reaper: reaped process 6866 (syz-executor.3), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB 01:09:09 executing program 3: write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) fcntl$setlease(r1, 0x400, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) 01:09:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_opts(r1, 0x0, 0x2, &(0x7f0000000080)=""/181, &(0x7f0000000140)=0xb5) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x2000, 0x0) dup2(r1, r2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(r3, 0x541b, 0x70e000) 01:09:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) 01:09:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0xc800) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000080)=0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x50, 0x0, &(0x7f00000002c0)) r5 = dup2(r2, r4) dup3(r5, r3, 0x0) 01:09:09 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffff, 0x10000) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r4, 0x6430) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000040)=0x0) write$P9_RGETLOCK(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="1f0000d290b8340039020000054f311163473644510c8240", @ANYRES32=r5, @ANYBLOB="010040"], 0x1f) syz_open_procfs(r5, &(0x7f0000000040)='sessionid\x00') r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_tcp_buf(r3, 0x6, 0x1c, &(0x7f00000000c0)="96821f2d3f1137e4c089bc8682b09ae404e66c3a277a5eb34b7d52c5e7d37303da02357d9445d1ebb8e06ca6804855374812e34800c1b05df089ec1e074d8222101965c3c0ec", 0x46) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x29, 0x0, &(0x7f00000002c0)) r7 = dup2(r1, r6) dup3(r7, r2, 0x0) 01:09:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000400)={0xaa, 0x41}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/32, 0x20}], 0x1, &(0x7f0000000140)=""/207, 0xcf}, 0x80000001) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x2001007f) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000340)=0x805, 0x4) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f00000003c0)=0xffffffff, 0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x29, 0x0, &(0x7f00000002c0)) r7 = dup2(r3, r6) dup3(r7, r4, 0x0) 01:09:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000480)) setregid(0x0, 0xee00) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x2001007f) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000040)={0x8, 0xc9, 0x1, 0x0, 0x800, 0xff, 0x6, 0xfb, 0x3, 0x80, 0xd6, 0x1, 0x0, 0x8, 0xbc61, 0x7, 0x40, 0x8, 0xff}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x50, 0x0, &(0x7f00000002c0)) r6 = dup2(r1, r5) dup3(r6, r2, 0x0) 01:09:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x541b, 0x6) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='io.stat\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) r3 = openat$cgroup_ro(r1, &(0x7f0000000480)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x2001007f) write$cgroup_int(r3, &(0x7f0000000380), 0xfffffffffffffc78) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x11b002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000280)='memory.events\x00\xbd\xc0H\x1c(\xe0|\xac\x15\xa6};\xe5\xdev]^\xf6\xa0\x13:_j\x8a\xe0Uc50xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) [ 1014.962145] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) 01:09:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmsg$sock(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r3 = dup2(r1, r2) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x50, 0x0, &(0x7f00000002c0)) r7 = dup2(r4, r6) dup3(r7, r5, 0x0) [ 1015.011687] SELinux: failed to load policy 01:09:09 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x9, 0x110402) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000000)={0xfffff3d7, 0x200}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000540)="c5bfb71032df6abebcbfe1cdf658a47a14e9de4f8a434fb1412fbfc68ebcee9f8f8d65f9c80a77f9232213aeee353e51f76d8c989861beb303cc0f031bb200ec2137647df4e032874e922ad9e66d79bf1ecc5a8d626734f09ccf5bf2552d056b3cdd5457c0fe9c96a93a25e8b6bb91e20a3fd5736cc44094fb5d1c2699e999cef22935c4f0b580513d7737487089474cf467e4a5801ec2260523510d8147a7f9bc7c2dd86b62ad89552dd925bf19f55ca475597ad7d986e9b8ec58db0600f3d85b61721d129b5e4b0a7fa6f6fbbfdc086b1c648803d2230a096e5c2b46e3215ba56b0b3708501209", 0xe8) write(0xffffffffffffffff, 0x0, 0x0) clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) 01:09:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0x11e) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000940)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r4) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r5, 0x4) r6 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r6) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000003c0)) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r8}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) getsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000380)={@remote, 0x0}, &(0x7f0000000600)=0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000500)="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", 0xff, 0x55, &(0x7f0000000640)={0x11, 0xf8, r9, 0x1, 0x7fff, 0x6, @broadcast}, 0x14) r10 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r11 = perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffe80, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0xffffffffffffffff, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x3fe, 0x77c9bcf9, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'\xfe\xc1\x00', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r12) pread64(r11, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) 01:09:10 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', 0x0, 0x0, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000000)={'sit0\x00', @ifru_mtu}) [ 1015.246132] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1015.285312] SELinux: failed to load policy 01:09:10 executing program 1: r0 = gettid() chown(0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) geteuid() creat(0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x6) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) tkill(r0, 0x1000000000016) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1015.314408] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1015.342399] SELinux: failed to load policy 01:09:10 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x1, 0x5}, 0xc) write(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000000c0)={@hyper}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000200)=ANY=[@ANYBLOB="05000000000000000600000003000000010000000100000007000000080000000800000000000000000000000000000000000000f7ffffff04000000ffffff7f010000006e0b0000010000000000000000000000000000000b000000000000000000000024e6000009000000030000000200000000000000000000000000000001000040000000009becfdf957b7a0dda4c127d2c72e07f7000000003f00000002000000018000000200000000000000000000000000000001000080000000800100000001000080010000003f0000000800"/219]) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000d9792794fdfffefffff820004000000000ed08691ff9dc0100df77ee"], 0x30) [ 1015.580068] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1015.625004] SELinux: failed to load policy 01:09:10 executing program 2: eventfd2(0x0, 0x2000000000000002) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000001c0)=""/7) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCDISCONN(r2, 0x7439) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000580)=0x6) write(r2, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f00000003c0)=0x5, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xffffffffffffff38) ioctl$RTC_VL_READ(r2, 0x80047013, 0x0) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000080)=""/36, 0x24) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000600)={{{@in=@empty, @in6=@mcast1}}, {{@in=@empty}, 0x0, @in=@dev}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004180), 0x11f, 0x40000) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) r5 = dup(r3) open(&(0x7f0000000240)='./bus\x00', 0x80000, 0x10) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='user.syz\x00', 0x0, 0x0, 0x0) r6 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) r7 = creat(&(0x7f0000000340)='./file0\x00', 0x0) fsetxattr(r7, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f0000000000)='-{vmnet1[cpuset\'wlan0${system$\x00', 0x1f, 0x2) ioctl$EVIOCGABS0(r7, 0x80184540, &(0x7f0000000780)=""/114) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@ipv6_newrule={0x48, 0x20, 0x1, 0x0, 0x0, {0xa, 0x20, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, [@FRA_DST={0x14, 0x1, @local}, @FRA_SRC={0x14, 0x2, @mcast2}]}, 0x48}}, 0x0) fcntl$dupfd(r2, 0x203, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r9, 0x6, 0x8, &(0x7f00000005c0)=0xfffffffffffffffe, 0xfffffffffffffe6d) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback, 0x1}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00\x00~\x00', 0x10) r10 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r5, r10, 0x0, 0x8000fffffffe) 01:09:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000058, 0x300) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x0, 0xf}}, 0x20) 01:09:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r6 = socket$inet(0x2, 0x3, 0x2) bind$inet(r6, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r3, 0x0, r5, 0x0, 0x10005, 0x0) ioctl$TIOCGPTPEER(r1, 0x541b, 0x70e000) 01:09:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x3, 0xbb, 0x8}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x29, 0x0, &(0x7f00000002c0)) r7 = dup2(r4, r6) dup3(r7, r5, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r8, &(0x7f0000000080), 0x2001007f) ioctl$RTC_SET_TIME(r8, 0x4024700a, &(0x7f0000000100)={0x2d, 0xd, 0xe, 0x17, 0x6, 0x6, 0x6, 0x19, 0x1}) 01:09:10 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfeed, 0x0, 0x0, 0xfffffffffffffddb) [ 1016.278128] SELinux: ebitmap start bit (-294134016) is beyond the end of the bitmap (1762192832) [ 1016.295470] SELinux: failed to load policy [ 1165.628548] INFO: task syz-executor.5:7803 blocked for more than 140 seconds. [ 1165.635906] Not tainted 4.19.75 #0 [ 1165.640894] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1165.648962] syz-executor.5 D23592 7803 1 0x00000004 [ 1165.654631] Call Trace: [ 1165.657254] __schedule+0x866/0x1dc0 [ 1165.661077] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1165.666113] ? rwsem_down_write_failed+0x764/0xc30 [ 1165.671685] ? _raw_spin_unlock_irq+0x28/0x90 [ 1165.676653] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1165.682029] schedule+0x92/0x1c0 [ 1165.685423] rwsem_down_write_failed+0x774/0xc30 [ 1165.690437] ? rwsem_down_read_failed+0x3c0/0x3c0 [ 1165.695638] ? selinux_capable+0x40/0x40 [ 1165.699782] ? __lock_is_held+0xb6/0x140 [ 1165.703864] call_rwsem_down_write_failed+0x17/0x30 [ 1165.709144] ? call_rwsem_down_write_failed+0x17/0x30 [ 1165.714347] down_write+0x53/0x90 [ 1165.717815] ? vfs_unlink+0xd1/0x500 [ 1165.721598] vfs_unlink+0xd1/0x500 [ 1165.725156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1165.730763] do_unlinkat+0x3f7/0x6d0 [ 1165.734488] ? __ia32_sys_rmdir+0x40/0x40 [ 1165.738710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1165.744286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1165.749910] ? getname_flags+0x277/0x5b0 [ 1165.753979] __x64_sys_unlink+0x42/0x50 [ 1165.757941] do_syscall_64+0xfd/0x620 [ 1165.761815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1165.767011] RIP: 0033:0x459777 [ 1165.771030] Code: 00 f3 0f 6f 5c 38 f0 66 0f 74 d8 66 0f d7 f3 48 81 fe ff ff 00 00 0f 84 fe 00 00 00 48 83 c7 01 48 39 d7 72 b9 e9 83 00 00 00 <48> 83 f8 20 77 29 c5 fe 6f 4d 00 48 8d 54 17 e1 c5 fe 6f 17 c5 ed [ 1165.790043] RSP: 002b:00007ffc460f18e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 1165.797815] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459777 [ 1165.805173] RDX: 00007ffc460f1900 RSI: 00007ffc460f1900 RDI: 00007ffc460f1990 [ 1165.812513] RBP: 00000000000013c7 R08: 0000000000000000 R09: 0000000000000014 [ 1165.819847] R10: 000000000000000d R11: 0000000000000246 R12: 00007ffc460f2a20 [ 1165.827156] R13: 0000555556110940 R14: 0000000000000000 R15: 00007ffc460f2a20 [ 1165.834995] [ 1165.834995] Showing all locks held in the system: [ 1165.841376] 1 lock held by khungtaskd/1038: [ 1165.845681] #0: 00000000ae727044 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 1165.854545] 2 locks held by rs:main Q:Reg/7623: [ 1165.859291] #0: 00000000b2446f33 (&rq->lock){-.-.}, at: pick_next_task_fair+0xfae/0x1580 [ 1165.867625] #1: 00000000ae727044 (rcu_read_lock){....}, at: __update_idle_core+0x45/0x3f0 [ 1165.876247] 1 lock held by rsyslogd/7625: [ 1165.880527] #0: 0000000050a4375c (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 1165.888775] 2 locks held by getty/7747: [ 1165.892761] #0: 000000004d2caea7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1165.901907] #1: 000000005608c540 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1165.910873] 2 locks held by getty/7748: [ 1165.914869] #0: 0000000024a4c26b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1165.923224] #1: 00000000703fe1e4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1165.932189] 2 locks held by getty/7749: [ 1165.936167] #0: 00000000a75a5692 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1165.944497] #1: 000000004393ea91 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1165.953574] 2 locks held by getty/7750: [ 1165.957535] #0: 00000000c1fa0ba1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1165.966027] #1: 00000000edb2e06d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1165.975200] 2 locks held by getty/7751: [ 1165.979330] #0: 00000000dade99a1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1165.987663] #1: 000000003d0e5841 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1165.996601] 2 locks held by getty/7752: [ 1166.000710] #0: 00000000acad28f6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1166.009079] #1: 0000000096b8c863 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1166.017979] 2 locks held by getty/7753: [ 1166.022026] #0: 00000000c82b991c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1166.030847] #1: 00000000e2a3222a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 1166.040365] 3 locks held by syz-executor.5/7803: [ 1166.045283] #0: 0000000021291852 (sb_writers#4){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 1166.053804] #1: 00000000856387cb (&type->i_mutex_dir_key#3/1){+.+.}, at: do_unlinkat+0x29f/0x6d0 [ 1166.063100] #2: 00000000f48da6d3 (&sb->s_type->i_mutex_key#9){++++}, at: vfs_unlink+0xd1/0x500 [ 1166.072343] 2 locks held by syz-executor.5/16028: [ 1166.077203] #0: 0000000021291852 (sb_writers#4){.+.+}, at: vfs_write+0x429/0x560 [ 1166.085116] #1: 00000000f48da6d3 (&sb->s_type->i_mutex_key#9){++++}, at: ext4_file_write_iter+0x23f/0x1060 [ 1166.095377] [ 1166.097000] ============================================= [ 1166.097000] [ 1166.104171] NMI backtrace for cpu 0 [ 1166.107821] CPU: 0 PID: 1038 Comm: khungtaskd Not tainted 4.19.75 #0 [ 1166.114303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1166.123653] Call Trace: [ 1166.126244] dump_stack+0x172/0x1f0 [ 1166.129863] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1166.134351] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 1166.139330] nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 [ 1166.144640] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1166.149846] watchdog+0x9df/0xee0 [ 1166.153300] kthread+0x354/0x420 [ 1166.156661] ? reset_hung_task_detector+0x30/0x30 [ 1166.161495] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1166.167073] ret_from_fork+0x24/0x30 [ 1166.171088] Sending NMI from CPU 0 to CPUs 1: [ 1166.175669] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0xe/0x10 [ 1166.177316] Kernel panic - not syncing: hung_task: blocked tasks [ 1166.189495] CPU: 0 PID: 1038 Comm: khungtaskd Not tainted 4.19.75 #0 [ 1166.196000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1166.205353] Call Trace: [ 1166.207942] dump_stack+0x172/0x1f0 [ 1166.211756] panic+0x263/0x507 [ 1166.214942] ? __warn_printk+0xf3/0xf3 [ 1166.218829] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 1166.223778] ? ___preempt_schedule+0x16/0x18 [ 1166.228204] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 1166.233688] ? nmi_trigger_cpumask_backtrace+0x1c1/0x1f8 [ 1166.239138] ? nmi_trigger_cpumask_backtrace+0x1cb/0x1f8 [ 1166.245554] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 1166.251002] watchdog+0x9f0/0xee0 [ 1166.254463] kthread+0x354/0x420 [ 1166.258095] ? reset_hung_task_detector+0x30/0x30 [ 1166.262954] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1166.268605] ret_from_fork+0x24/0x30 [ 1166.274420] Kernel Offset: disabled [ 1166.278373] Rebooting in 86400 seconds..