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"], 0x1}}, 0x4000841) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) fchmod(r5, 0x180) setsockopt$inet_tcp_buf(r2, 0x6, 0xe, &(0x7f0000005380)="d09406254b8a0b8a1b46eb0c0a479781095aa5f3d9ca5c6b00f4a746ef08f95181cb801a9c9c532f0f8044159276802e81b45631f79e", 0x36) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f00000052c0), &(0x7f0000005300)=0x40) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005200)='team\x00') getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000005b80)={@ipv4={[], [], @multicast1}, 0x0}, &(0x7f0000005bc0)=0x14) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000005800)={"00000000ffffffff00", r6}) getpeername(r4, &(0x7f0000005500)=@xdp, &(0x7f0000005340)=0x80) accept$packet(r4, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f00000057c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000005ac0)=0x14) r7 = accept$packet(r3, &(0x7f0000005880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000058c0)=0x14) getpeername$packet(r2, &(0x7f0000005900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005940)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000005c40)={'team0\x00'}) accept$packet(r7, &(0x7f0000005640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f0000005180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005680)=ANY=[@ANYBLOB="080027000500deff40000100246173685f737461747300210000000000000010000000000046d7dd94080003000b00f8ff30980df88d86070000000000000000000000e90b031127172e8e3794db5fcc9d9b189df6e5e0a316b9fd42ba03000000724a8bf4ffe141bdb976efda9b9f07a527514c6e3a07d16b2b22c6d12abf2f214a6498f90e850f9e1a2792338d9ce8caabc4ff57cdeb98084bf6b9272b1ddc722b10559720a1c82c73c888b35ddd040072bfab46f6fad8b52705e42b0894c5af9075b11514bc2ba11b93253de6ee00000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) [ 158.522312] SELinux: failed to load policy 10:24:19 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, &(0x7f0000002900)}}], 0x1, 0x0, &(0x7f0000000000)={0x77359400}) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5c32, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6102) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000002780), 0x8000fffffffe) recvmmsg(r1, &(0x7f0000002f40)=[{{&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/32, 0x20}, {0x0}], 0x2}, 0xffff}, {{&(0x7f00000004c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000640)=[{0x0}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000000740)=""/240, 0xf0}], 0x3, &(0x7f0000000840)=""/142, 0x8e, 0x100}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{0x0}, {0x0}, {&(0x7f0000000c40)=""/101, 0x65}], 0x3, &(0x7f0000000d00)=""/35, 0x23}}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000012c0)=""/90, 0x5a}, {&(0x7f0000006180)=""/4096, 0x1000}, {&(0x7f0000001340)=""/186, 0xba}, {&(0x7f0000001400)=""/192, 0xc0}, {0x0}, {&(0x7f0000002680)=""/225, 0xe1}, {&(0x7f00000027c0)=""/198, 0xc6}], 0x7, 0x0, 0x0, 0xfffffffffffffffa}, 0xab}, {{&(0x7f0000002e00)=@alg, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002e80)}], 0x1, &(0x7f0000002f00)=""/25, 0x19}, 0x101}], 0x5, 0x40, 0x0) getpeername$netlink(r2, &(0x7f00000001c0), &(0x7f0000000200)=0xc) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x6) preadv(r0, 0x0, 0x0, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000d40)="a4dc4db128532e7dc32ee26e5c69f9b060d6fe4092ee58d509aa33c67b05251098bf5cb41895bb86355fa8a030fe41d7cd2b02bfdd51a8a3c19e8082901a1e331258f19e0de6f01ce58402d63e9a056b160475fca57752c65e3ee8b762f0a29e98b85a3a2f789b2390ce64fda963d8c0a1302bb528ed6329b9bef0fbcbb252dd5ac695f52c731f5190585c4f88548ede405792791fb394e61590edd5141831b48373863973e6cb8db8b262e32ac94fa921ead1f989f5a7e5190161b5200ea8d913ebc4e0fc95d750267ea4f303f2975362e1020d23c2b86fc66e57ee5f2ce1f67157fe7f") 10:24:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) 10:24:19 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) accept4$packet(r1, &(0x7f00000015c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001600)=0x14, 0x80800) sendmmsg(r0, &(0x7f0000004d00)=[{{&(0x7f0000000380)=@llc={0x1a, 0x30a, 0x40, 0x7fff, 0x5a, 0x5, @local}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000400)="7fcd0da129cc4279d626dd22424973c1419ec0cd21e2940ef38e7a4ebfa75c64c8c7744e79b7d09d967aeae9ea7b01337991e662e4b10db8c3639b5bebf245bedebc7e92e7ece31b3f35fbae17d35537384d6d9c60ce5d3a9437ab359bc2b9fa3cd4f224d830d3ef23c27b5b70fb3723635b83d88e4a4b411ce25da75e65de9f1601ab06b314d4e564ce2b6ae163631d324e0085d5559e127cd020ee6f7de0d801c8b32a5a0690a04c29e0244528", 0xae}, {&(0x7f00000004c0)="45907e1d57921350696ef90655e9144fd6cd9dbf15a3bfd7fc0b44ff05343a51361190e057a5880fca5dfc939609f2e747145a7ce890cfe2b8d449654b4f1d988b5f70d1d4c806d431cb1c6eb295a53a6252", 0x52}, {&(0x7f0000000540)="62768e3e55a82b82236a7f899f3a832589d9b53aa06d68cbafdce9c89bf2e24d25dfe3b5caad53a19f2707dd9ab03cd778dab46b30382cea194e706954d3e6dd121003e0e1557a456decfa28cab5c200", 0x50}, {&(0x7f00000005c0)="203701a1262095b5f07a25345d0e79c331f2280a87889824", 0x18}, {&(0x7f0000000600)="87ae6b69172a045290798d2ce316f37ec123dbaf5517e4081214a437dde8732dbb7f47fea2cd415b0db9ca89df03a2f765f1c6d107f33510f34d200147dc63f85b77c38976cbbb41538dd421fa8efdf91ddbf469fcaaeecef9cda163dab7ef6ad7a218e61c4516f9866f451fb487b4b494eac7a5c89e3e4a5ab7957301f3952d0cf43daaf1f5", 0x86}, {&(0x7f00000006c0)="622f0293a4656436ad6c151607d2aa51b21b1a2fc10b983b3460d3d2ae272eb3101ac5aa619c9d7cd8ca1af5dcc9bc4d149947c1ab7eee37e5fc0fa1f0cbbeda424729231e93b234b42c4b849c95aa122d511f00a9add283ff46f9c43608c4e3fbf3ecb908caf38204790c67f542794b", 0x70}, {&(0x7f0000000740)="3476be9b08c86c02083e7fb2cf66eb515f99c84f3d574b02e30113efce92ad07bec978d830cfdb9f12f172cffb57d282f45c7b5a199e9b86339e7b592e63f003d74d9f03c6c22c5a09b328d1d2ad485cd53a013c292e66e64bf1262c3c8ab0387c7e", 0x62}], 0x7, &(0x7f0000000840)=[{0xe8, 0x10e, 0x0, "6cb76486bda37eab877cb547aff75dea8d776db50d890933fc4376e88daec83a90963bb51df0339d958ad3d2190906cd298147242383bbc8c1bd7e8500d8003bc76af0fc5ecbaedef437d0def22633e84a6bfcbcf27cf42160d9e553d85c525606818fd606fbd7c7b4dfc8763a31092960dfb5828e6487fdbb017c50b8045ca8d38b8153ef2a23e675d43719de33460666727559424e190bde2e460763aa45faf2d12ad068a1e92ea84fb7d2ecd3536f8ef32efa490526b531006d143a3fdae7e01d70129c5fb642dfdf7ff346ed146944cdabbe113d5b"}, {0x68, 0x117, 0x81, "73d460d43cef8bfbdb33585b456cd6abc088ea94977d105043b7a5c9b7944e70fc29af1f1872282f636561d70e49a0d7b37823c5a92a49f7a3bdb027736d7b0fac737ad0040336acf881fce83bd7739fad"}, {0x38, 0x1ff, 0x7, "10441d415eb032be676d53f9a5a19ea121e067356dc6c5107ce6d879967907fef3b07186"}, {0x88, 0x115, 0x1caf, "240313ef1471a6d48c54aa94392bf3841ae6c512f412d2084ffa0ab677c3024c8deb2b5e83ba48825f48924460cc11d412f6bf26e326d30a10c3b0bedf42b37da8bf9f86e63d49408390c6159b99b111c1ad7dba5301b69c03be4d6d2b06e1c71de5205efc3ca41588b82ae90755fdd676b19342"}, {0x40, 0x100, 0xfff, "1cb3ed7b9dccd6442d0badab9a44aca5059ffafee036967b7f2340114952d0755dc6482cf88abe2b649aff5ebd"}, {0xb8, 0x117, 0x101, "2b4bba1b127235a62a0db75f7dcb2e4444111274dbd7a8cedd72fd7cbb4ff747126aa377cf61aa7cc17e18baba86d111590327df83e5e1f5427b582bde356323f175b3013a7bba62ff3d1205d2666ca47e05bd921537b0859e4578ee955a78bdba7218a79da28ed3b191570927fa467de2b3ffab58990953ba8b2775867c7a8eccc9cdc68eebe087bd0b27e36c1607c560d18983a496663ac506c07bb49af0757a"}, {0x90, 0x103, 0x8, "0655071af540b78834b6480807d3d174bef4bbff314f7acb5719c4cb9f2003a34e0c922ae62538dbfe8454d6a9451c8e1719de011b2837da9f4ea520b41236048fb9631bf929704188fa25ff6fd86a3e1faa8814c7010205c1b8598d1df671f24769e3cf211947209c2eef73477196b6099392d62673b01bbcd3fdc66c3f"}, {0xc0, 0x1ff, 0xb5, "7b1f1b5ee05bf9dada57a7ab8a1f8c72fbe98e5dd7906c856074b44bbf6635ea0b86ce4fa87cf1a46b0b7d2ed791f4d48b5b2c3566e2cab635e8fc52c09119ffab03cd9ce41f049467e1c660cf633672ffef1cf5828cbf7a3e4df4a7a7b1362fc51680fed1ced5f68d9693aad8e09a93142548d31b69ff681a6538288d495dcd0160be92b84304151fe1a68bc11c54d30686ff60fd614fdd4dd8ebafc5f40eb311bd510a28d9b584bd24dabce7"}, {0xe0, 0x13e, 0xfd, "6073b5c9d3084d06d046000a375f6d1b84fbab7c7fc6d7d5711c1dffd87b734b9b627a3c1ada2c541736d34664d38aaa8c401eb6c4c2b63e2c1ad219b6bbb7d1defd03bbcb1104537cb3ea24392723cc99093fed5384addadc50b8e301140da76e65f767e852c2cd093088224b8798d3a95b75cd1d9467d6b51293b98e668043b34b0b4a8e708fdb527348d1854286979278143eaad3b932d4def5e746e3184dc2bba34abc6250345340e6f840c1b4ba0757a6e5c33c012b83257cd68c670bc44719491d5989286e9e068e8e"}, {0x108, 0x117, 0x7fffffff, "fca63c746c43b06eb9ebf9454d43c95983018e2cc72f156c39b8736cd01bf12028c4176bf9633828538b1582ee4fd8c642d06917020de9c28147d6c834d0290f68fc11fe883feea7762358cc1f3a7481d606c197e956f2403eebbb661e8a276d573a3d6fae45e8276053d25dadcddea0b8595452adb80560d886f034074a84751f4ca6242cac334d223c71747d0dfe0cc2a2de52bea4b96d9bc464d6e9af523592ee2277a8bf7a770c1a1bf22cd6b0273efc29c3af76616447aff398f90dcfa3f0f5014ea9ac25e306185567fdec26f2d590b43aefc2213bbff84ddb30bcb74bdf912bd1537da0356905c7bddbcfcfc2d07a2ba16e"}], 0x640, 0x4044}, 0x7fffffff}, {{&(0x7f0000000e80)=@ipx={0x4, 0x2, 0x2, "c2998b5b7901", 0x7fffffff}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000f00)="78831aec416d6260e06025a300e008a12695e540eff0cfbcfe63f51d8164fe0e16ebd2166a284ffbaad51f2501d189cefab454039e5fd04e01e57420f341fa81360422e6c7a4ca2cedb0b074d29ce4be6162162433020d011d3b61babe76be94540e2e9b4905d2c04b3bba0710988b45664cb15b8b1a", 0x76}, {&(0x7f0000000f80)="e7edf343e4d37edec0dd2b3a170509fe3fa1f1c4dca64dc9c169db7c4924", 0x1e}], 0x2, &(0x7f0000001000)=[{0x58, 0x84, 0x7, "796a2d334244b2ae630b112320a3df2587d1d0f27c0f5743ba829a00cf2549983c03d0c9a924f0b4c4827f84550f1a4d1dda1673dfc57a94db7037a578e20ee42fd5"}, {0x10, 0x108, 0x3}], 0x68, 0x20000004}, 0x3}, {{&(0x7f0000001080)=@ax25={0x3, {"d87d3ea18e73a2"}, 0x4}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001100)="0f770cb65f7c5aadf6276ab88645e8df020b8bc6a36c71a7fbb517d648814fa6aad39c14a47a53bd71e5430783f5c08cf7ce300a6f2197b30c18bb484732b8ea4cc4fc0f63cb51fb33dd83a05a80cb66f2c4a9d5cc5c795d5c569816a029b19385b98efe6b103b840c871a9714708a301f01875664d5f04a3290722aea072768c5bbd94075a9331d7b56f0c5645d2c183133e18a3970aec4a3aa77d5a9e69f948f4549a8aa7cfa7ecb05b93378baf9e880316fc6c80bd2bb1ff22eed84d550b88e5ca3ad77083cf6716b8e0efbd96416b812737787c30d9751228efab7a76a", 0xdf}, {&(0x7f0000001200)="a1a1a6bd5a903942ea1a6cf977095271b538169683927ed26778e222e06db9ad0ef3db7d36c398d9efa2cbedc1d12aef083787b2fafbe2602d31756215b7a2d286b66711e7691b84a836808673348bfe77a1fcfebf0b4d73f5f8a576140cf5b967bb65e9224245403376a5c4f1faa3c23c7f2a4f0d", 0x75}, {&(0x7f0000001280)="bde4c5fd81ab6e94eb3fbb0c4c6a2d1854fc0cbdab159193cf7ad1827b63d40831efb739725cbaedfb3cab68734f1a8092579f0bfa696247f1dd635b70d7e8a843a175d82fc8fdf09444a15da4b1d2a5c7b33764a51552239a57d746c500508b51f5ee80ca9273c697bc782497ec0af11116da7818358c0d3b638aa24354fb7b69cdb0ec9e40bd05db35e1633f57bb556fc8cb6d", 0x94}, {&(0x7f0000001340)="ecce71e31f2887c37c879dc9d004892c7214955e9d675384fae2bfbb9da47b6e89d2588b1881068c42fde0578f6f41567ffe2385a48d106fc125a8c551d34d5d1ab5949b97e6e3a44159a79fb934f4f4c2c664786a998b596fee19eced3dec8a335af52f07463c399a31f07bbfa30172b0799cfc85fc04e7c94c442a", 0x7c}, {&(0x7f00000013c0)="b7fa5a8eab2cb4471f44ee9d7e5c6455e82ea874f4253fec48170fb5e577c6692aeaf76b5d431b7f68d6c9da8957f5472d5e5754a9b457a4b56c489d22403f228da7c661a01bbb00076bbc67dde8f82acee122066712cbd2876a23656578b1ea93fa1dfb91686eca7d7d1cfb1d02e0ddf0654db00cbec0beaaec40ce2adc05cf739e90", 0x83}, {&(0x7f0000001480)="27e201332b18ae6b01243dc59579edde9ef38d7db0ff58c3b885ba9b39dda130588746b3e766940c5633d711364a60c80ef3721a50f9b9bba62853c9f786e6933cde32febcdc4f30dd6bc3ffbb5b52f52820268f5cc5a017c28665aafbdcfafbfd185dc1e7d13bcc5bf69a9927367365cade15293dfcde3d90cef07ae8014ef680df6415fac2a63f667e553eb0c2a093", 0x90}], 0x6, 0x0, 0x0, 0x20000000}, 0x9}, {{&(0x7f0000001640)=@ll={0x11, 0x1f, r2, 0x1, 0x3, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80, &(0x7f0000001b00)=[{&(0x7f00000016c0)="3872500e9ba3ecaeb679e6816eed85e8195c67c92588fe8abe9e5bf388e3769fdab85ada9fd7d46bd88f36c86305b8894b0fd5bb06186b4224e243b00c7d95a867ee8db5a659a503c008e331724941fa88c8e6627d54805448d71d6cbfb2deef7fde729e7f22552b4b5158b101391d637857c9c2deac41e2401274c1eda31c0a6fdce800e657fb632d2ffed9e925eaf734a1c6884ae528595891709e7a7a7deb9cad2d2596a5a0eef97a40597a614e82124080a36ee0", 0xb6}, {&(0x7f0000001780)="6df1b24ef56c57201309948c4e7ee64eef9e6ea6db06f0a189bdc013798dc3980bd34b5987773b1225701a2958e785b11ac4480f0c408afc4e58fba269e70fef7d87d6649bbcbefcf28cc82e427cc4498406db07a0ba5c7f85b77abc7726a4a8100892ae2334a52c07f9e6258adde6b866125018c7cfbeb6ea6d40526540ff", 0x7f}, {&(0x7f0000001800)="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", 0xfb}, {&(0x7f0000001900)="880b850549542ffdc69f993ad7216390fd2d4f1491e146bcad8289da65956a0380fddba2da1a5abd65be2753e39432ab9109d771d21663a5cc0d564c49ff3cec915e6668f529", 0x46}, {&(0x7f0000001980)="7de4afeb9ce5785c31b1efd2f84eaab55159003101ae138b3ed0fe1556c9b58565516c82efe878e5efb6eeaa0b90b411c238c974a0533e3c5aca105c08ede9dbea2da83e7976ace3e4581ba83661edffbd84c0f1a753325078a5f6966758ba5a72f21b4b96a400af1f5eaaebd9eedbb4e5b0f219493de132f3e1a0bf6d434bf89481b6d2dbd8c76f067220928f37decb888d7410c8dfee99c903f1a8879ae5f1ce7bb883a65f5ddd9f2b31d77720a82e3a5ad747", 0xb4}, {&(0x7f0000001a40)="b6a42c2f9d800526ddc1a075c03a2b4c0ad01b9145d3507d55c2420221e611e117d392ebd150de384876b1cb572adeef095b047b5d3699df74e07b9e79883d43b423b7fba677436b9fb333e02a30b8a3ffe1772e37b4e0498df5cf4af0eaf3b573f03d3175f358629414645660caa32a4a77a33520606b7941355c37e9b59a6fe1693be438f370", 0x87}], 0x6, 0x0, 0x0, 0x8000}, 0xfff}, {{&(0x7f0000001b80)=@rc={0x1f, {0xffff, 0x0, 0xff, 0x3, 0x24b, 0x1}, 0x9}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001c00)="42bb97624453886fb2d6044e9629d9fcfc7f682aec9070fa0ecad690f97e7ccfe02d650b1f5191450827c43184df38528730a395a6eb4360da86f90cf2b41eae2e5556a5d261a00eeb11667e0e3b2b4abc97a9e3eddce6aed73b4b7311eef38c540d6ad844c91428b5e31e349ce98b4062a38e2896130fc164a3381826b27c70ddc46910745f2c8cfb7ca81326d29a9e95f66b96165c49fceea7e5eae2bc8ce85a5c7740af84e7c18367b1a6e8262fa76c547bf1e2c304ce12bbb006e51eefc9ebcbce2328261a7d4f7a1ed13868883fcc1b602b78b9da0efb9b983de33b", 0xde}, {&(0x7f0000001d00)="85af661d8229ce7ef4e1170d1262ecfb9a9ffb10abbdd2c16cedcd479ae6b444f9377b1fc7d00da92212e36eb6dad2ce2b337d51fb41337b438a1610cef34d9c4fbda585b6a0cc02fbb4b17a2626ba4956da49ef786d397b6a14c3ee09a02afadb63f40d4be2dac83341547fe5cf6a44d35505c5310c8ce8daed1a63bf2d4594fa79dcd6ce7da51b1b87440793a4c5672cd4dadfb7e9a6b8ecc1e9bc2a5e9b08429228f29904b849ff8929e6a26b", 0xae}, {&(0x7f0000001dc0)="2147b0a09004041b25d74e80aae285247d223b438ce67df3cec3ac83324c2385a98211cb162c94d3e406692b29518d7d3593c575aed61ef1f3f87c96", 0x3c}], 0x3, &(0x7f0000001e40)=[{0xa8, 0x10d, 0x6, "b1b30702c80a5e144f30b481863f0738f0161b4c886628af4895b161825f3d6e0cdd5d52d7ef4f12ec4ddd32c519ce81e1acf0477ee72482f2c3fcf06e159c5418caeec387689a15e68de07a26eb196feb1e7d3b10710ed9665e0b358e648be2647c85dce1e935d416ee418b7c926155aa714cea4deabc5ac5069e3a38263ca7c2cfc41225dc3599594da1bf63ec2883443cbb"}, {0x98, 0x118, 0x100000001, "6285f2cd37f42c70fcf2ce7d1e46c8f57de5ccacd7381435fade3f420c7cde05519a556de2f4a951ae7c166a9a341279cb67792f076bff21f16322c966dfb29f1086598e5dee4b25f4cc10b20881f0f46b8cf41ba6cba6d536137957091aabf806c60b5dd92f37abb89cf45cfc80664c529cf833a07471982da2286b2ae9f47cff75a800"}, {0xb8, 0x104, 0xa9d000, "52e032d5f01cf0ed761fb39fd176db124c0a4ca80c414c6b8de6d4bca10abadfe89413cfc19bdb15bf28fcab0d762bc0bfd82b5c902c8a2a707c98f5c769807681e54580d3c102f76960a9ef912590e48565db219613475d4b0aaa5d9da2923e595987949a801c02ee023952378a577982a2aa1c0d12cb8823a326a7ea3facdccd16276d99aa785ce3410d4f681f77c030a0e584f610c31281978b61ae6f956daa72a725b5dd"}, {0x20, 0x116, 0xc662, "7faa0d6e72576578b32e683c"}, {0xa0, 0x0, 0x12, "74ce87439865aa8d7f120380f0bc16f81d032ca48acfc7b0bdb819344b01102ed8c07556dcb7fe7faa96f62fd76d27c922fb5182b9a34b5cea07ad3a6f51bf8e1146dce6a6a784c63be1e06e9c4989176aa5cd2489784a84f535c5209888c3a3d2c53dfde3448442211b1cf71913c65aff92e96f20c00df2afe968df8876521a406fc593d1935d06871cc6eb4155dfd8"}, {0x110, 0x29, 0x81, "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"}, {0x1010, 0x0, 0x7f, "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"}], 0x13d8, 0x45}, 0x8}, {{0x0, 0x0, &(0x7f0000004780)=[{&(0x7f0000003240)="192e74e4491b70bc4e59c562180ea44326fbf2414f528d5a6d6e33dbea39236894b2ba5c6aef3fb444539a2c992c59cae54dd06c7d7ac2e8b1ab69e5de1762b8dd6f4b9827592f1fbcae8a6d20075f37a1297ced6306afd3bf1306c4bf1c398c6cdb6e934b3e0647eaceb8d5bae0983824dba6d533acbeb9e4e3213e78660ed43cc84df35d4a8e6c78a4bc3f2ec6", 0x8e}, {&(0x7f0000003300)="9052b753f37e8aecbd7753c5df98b86b5a389c3712af13bde4bf4f1eebbd1fed1a9d411df09b60095b182b5d421ccf166da1d0ae01010fc029e0299306d7d3e0371b0cfe78208696ab7d3cedd54ac61053d584e996abc0d4d955d86c86743156a85f8b29e200e1e669f43e679a198ccbf29185e6080db8ee5c14d0c87dae4632e6600ad289b244faa04fc7139269eeadbe1d33f980b259b2ba797c09f6cc26f026da7d12c81cdee44d1364e4087cbb544ebce3a5e221fc0fce4fdc7cd510714a9ebfa0dc64", 0xc5}, {&(0x7f0000003400)="4216a6bb31aceb0caad81287b18bf73187472199efad7caae4d66dedb3d2c4cdc3b6e3dcadf42beaa38177b24bd62133066c3564582c4fccd5035206ea01e20360490e785eb0812c6a9204f9fd856844dc9fb0f960c2baf740717b32429e2e2a768d43d70bb935439e1e1efc58b0773f8357088d20f00e603d704508a0983614fa13fc73a7fe45937e00525c3438daa0f636542a94abccd1ecd6564ce52d343ec12a0300cb7bff44245c415d49", 0xad}, {&(0x7f00000034c0)="a568d466d56ee07d00554775962124fe95ac9a2537a68c03890c7e65bb6225e1fc5c7c123f51eee35ed3b62b58b86a0e7e32aad19ce563422cd37d0606e0e0af5ca033be0faffcadf3b0b38bf34e47ddbb8a70656d6329a0be8209bc4c208db072a42fb45f74d2e6ffec276515", 0x6d}, {&(0x7f0000003540)="6563325abc58422e6440405d2d67161768ef4f103677da78ba0ffef1743387cd9deb4a4dc71009be186d2bac3609be908dcd6915d79651aaa857f60aa8d1447b4aa05fcd32ec2f9666d3bdba398a88fce24b47237044de11ea7351cabb12945a61c2d06f9cf5", 0x66}, {&(0x7f00000035c0)="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", 0x1000}, {&(0x7f00000045c0)="1b5a25aef3c267e535fff56bbc6af6963bf965cccec9b9eb4c39c4704f92ab495506c4a3c44874b0dabe76c7affa165720d6c247ca30309bb2fb47ff7c9001fbe44270d820d189f11af1270fa3f245efe6ac57d34590520704ec81721b3b78f33c4f", 0x62}, {&(0x7f0000004640)="f382add55f666e02a251d22dcc64ae166f54c1345104baf4fe836f53d0e312df2b61ed474fd2efd0420b4c002472914212eb8171199a76d2555a961f51ce567fb7c1b4b7c3a2f983ded2d229fef794022e76f3da1d6818272684d0eb52543be9048c0ee9e13af791513e8395e712becc1a570e83a9c6ef64cc4356e02797125ee3d1b31520d1b549ae337c02b3d370acd5d40a462ee4ddfbaf275026ee7d466f03ff8a0d763b6bdd6148a478b7e6b22b02b4492f6089a4c56a8d59462e423c3a033610", 0xc3}, {&(0x7f0000004740)="d1", 0x1}], 0x9, &(0x7f0000004840)=[{0xb8, 0x119, 0x0, "b3104859ed057d61e9ff33011ebf720858f38b371930901fc1a77da77f9e3967cc80b31e6979d1da61cbeb9a110a2d19113a0ead16bb272c6cc1789870730aa20d59a3669899f80a05229f4d2b0991947a97b7cf65e9f9b970fdc3554c71567a0b138760a59971429cfed2ae2ce6ed7b74e1e1cd124b46c4d5b4f66b30cb5204cb8fe7ef9dbd1379263ae223aa9d98480a9ffa614610e1e01e4d754b1ef6f3ee41"}, {0x78, 0x18d, 0x6, "b685e81bc5bf2d2bdb4c5ecdf50707c5099bafb93a26d052d4d80b0ef68a58397cb864d136ae4cc0c8a98004750cc94a642a1a3d5f2eb5b50de1ce9c79fc0f1f13e9041e95367ace8b5d004c95c5c536d20b8936553b8be24197f9a95ebd6cbb7a"}, {0x80, 0x19d, 0x401, "6ae7836f66c2eb6f895f100cd4c698b963caf67a52d5aa5d3fc1057c3330643de0e424e56083205260aff118e0c86a697d5ba54390c297346066e4ddfbe0d5e427d662716c33222a52eb8858eff4d2173f7eeef168f554fd098b3f8314a020b95fb378286332fde992ef9040458be9f8"}, {0x70, 0x100, 0x9, "c97f35b0016054767fe33a3d140b5d31f2660b15325f92456c5817dedc2227152ae39fb284dc67d28774e4ee7d46e1abc7da31c4012fb2e7b119ab6f3df133357b5b438cd1f34dd6c2bd35a103a01156b38f5e3277e8e657b63d395ed3d133"}, {0x100, 0x19f, 0x80000000, "a57c360b2a46d1112574f459850e93aaf87d910c58bec64abe8ecd3928ae0c63609982731e30b3cff067b0da16b9563a1703d2bc9adb504c54a7aa1f688ce455390a4142f186d7f5a8dd0e58de11da1814ca8929ef64fe361bf9b164f086a68578875582603d2ff120518ca324c6e924da8ee3226c98ff2b76a36ab930b8ab448c38912d6a558681079996838af99663e4d814022494d96451dfbfd85983ef327457acc6cdfaee4dc474b1f6a335030ae7e18b7932e8ccf9c0a935735ceeb854a8f00c32258b3f74d66de39fbf40006ca624da4f80f9244b699e3744175b7a91011c1143cab0fe512ef2"}, {0x110, 0x3a, 0x80000000, "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"}, {0x90, 0x3a, 0x4, "916cb9828b14efd516165b5a08dba9cb6387d08d5296984996138042212ed5cf2b33524c924c46687687ec589b506ae6daf54b5c3e5ba076fc8eb98a10dd19b76962a5891f64f5b0ee62321165d2f69d00da7d783ca236fff2c657c3c0969b05b1ac89046d157b8bc49fe5ede3e3acc1d95843838dcb2a7b7ba8"}], 0x4c0, 0x20000000}, 0x7f00000000000000}], 0x6, 0x40000) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000002c0)={0x8}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x88, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x0, 0x81, [], 0x0, &(0x7f0000000000), &(0x7f0000000100)=""/129}, 0xffffffffffffffff) connect(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x0, 0x4, 0x1, {0xa, 0x4e22, 0x89a1, @local, 0xc5e}}}, 0x80) getsockname$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x400, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x3, 0xffffffff7fffffff, 0x0, 0x0, 0x0, 0x4453, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext, 0x0, 0x7, 0x800, 0x0, 0x8, 0x0, 0x100}, 0x0, 0xd, 0xffffffffffffff9c, 0x0) 10:24:19 executing program 5: r0 = socket(0x10, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x44, &(0x7f0000000140)="a21d1cfaa3bb33bc5ad0cd2f0e8a8cff4b82e47af3d88b9942", 0x19) write(r0, &(0x7f0000000200)="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", 0xfc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000100)=0xe8) 10:24:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_cmd={0x4e}}) 10:24:19 executing program 2: r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000d80)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) fstat(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0x242000, &(0x7f0000000500)={[{@mode={'mode', 0x3d, 0x3f}}, {@mode={'mode', 0x3d, 0x20}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0xfff}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x9}}], [{@uid_eq={'uid', 0x3d, r2}}]}) mlockall(0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) prlimit64(r3, 0x3, 0x0, &(0x7f0000000240)) r4 = creat(&(0x7f0000000140)='./file0\x00', 0x3) write$binfmt_aout(r4, &(0x7f0000000bc0)=ANY=[@ANYBLOB="08012003030100007f020000f20e0000030100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba0e4329dbc40000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000008000000000000000a4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c56610000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fb44bf2a00000000000000000000000000000000000000000062e21d77227386c90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000415e8c9268221400000000000000000000000000000000000000000000000000"], 0x4c0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r4, 0x0, 0x0, 0x4003ff) write$cgroup_type(r4, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r4, 0x0, 0x8000, 0x8001) fallocate(r4, 0x3, 0x5e89, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr=0x100000000}, {0x306, @local}, 0x4, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000b80)=0xfffffd2c) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000440)=0x1) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f00000004c0)='./bus\x00', 0x200000010) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000380)=0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 10:24:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000"}, 0x24) [ 158.819082] SELinux: failed to load policy 10:24:19 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r1, 0xffffffffffffffff, 0xfff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x401) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000040)=0xff9, 0x4) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) connect$inet6(r2, &(0x7f0000aacfe4), 0x1c) 10:24:19 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @broadcast}, &(0x7f00000002c0)=0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) clone(0x4002102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r4 = getpid() accept$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x10) sched_setscheduler(r4, 0x5, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000040), 0x20d) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) [ 158.995978] SELinux: failed to load policy 10:24:19 executing program 4: socket$inet(0x2, 0x6, 0xffffffffffff1dbb) r0 = socket$inet6(0xa, 0x80000, 0x0) ioctl(r0, 0xffff, &(0x7f0000000240)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0xe3) sendto$inet(r1, &(0x7f0000000000), 0xfec4, 0x4008000, &(0x7f0000001000)={0x2, 0x4e22, @broadcast}, 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x32a) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$KDSETMODE(r2, 0x4b3a, 0x20) setsockopt$inet_int(r1, 0x0, 0xb, &(0x7f0000000080)=0x4879, 0x4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000200)={0x3f, @empty, 0x4e22, 0x0, 'lblc\x00', 0x3dded17fc65ec1d9, 0xc1, 0x2}, 0x2c) sendto$inet(r1, &(0x7f0000440000), 0x38c, 0x0, &(0x7f00002ce000), 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={0x3ff, {0x2, 0x4e20, @rand_addr=0xe7}, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e22, @multicast2}, 0x11, 0x2, 0x9, 0xfff, 0x3f, &(0x7f00000000c0)='team_slave_1\x00', 0x6, 0x80000000, 0x8000}) 10:24:19 executing program 1: timerfd_create(0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000140)=0x1e) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/protocols\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x1f000000) 10:24:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000"}, 0x24) 10:24:19 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:19 executing program 5: syz_emit_ethernet(0x145, &(0x7f0000000180)=ANY=[@ANYBLOB="199cdca81334aaaaaaaaaabb08004500003000007fff00009078e00000020000000003009078000000004500000000000000000000007f000001dfffffff6d4b183402999cf669c0e760861fe279a37926fd314b94a8a6cc67836714aa711d7b88d1b19ec119c2681b01d181010f2fc008d50587b491dbe4aa5aa6e7fc5555e1700319ef56fd53cc1ceea8592f0d6c236b18f1fac81a83fc0f1efe40c4af20a0327405dc0efe261adfba3312ced4fcc1c128990a19417f97fbce82540e729be75e6f69fdf38bfb1bba8910143e51d2db78a2fb0e66e563c0fe34b40f12fdfe9bf999df8a3190a47c42f10e7938c3"], 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) futex(&(0x7f0000000000)=0x2, 0x8d, 0x0, &(0x7f0000000040), &(0x7f0000000140)=0x2, 0x2) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x400440, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x11) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x106}) madvise(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair(0x4, 0xf, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCEXCL(r2, 0x540c) ptrace$cont(0x1f, r0, 0x0, 0x0) 10:24:19 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000440)}, 0x20) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x1000, 0x0, 0x0, 0x46, 0x0, 0x2, 0x10, 0x4, 0x20, 0x0, 0x9, 0x6, 0x9, 0xf9f, 0x0, 0x40, 0x3, 0x0, 0x1f, 0x2c05, 0x80000001, 0x2d73, 0x0, 0x5, 0x6, 0x1000, 0x1, 0xe4, 0x1, 0xfffffffffffffffd, 0x400, 0x3, 0x3f, 0x5, 0x9, 0x15, 0x0, 0x3f, 0x7, @perf_config_ext={0x40, 0x9}, 0x10000, 0x15, 0x5, 0x9, 0x100000000, 0x2, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x5e, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) setpriority(0x0, 0x0, 0xfffffffffffffffa) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000008fd0)={0x4, 0x0, &(0x7f0000003fe8)=[@register_looper], 0x0, 0x0, &(0x7f0000009000)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000005fd4)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000002000)}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f000000dfd0)={0x0, 0x0, &(0x7f000000dfac), 0x1, 0x0, &(0x7f000000df36)="12"}) ioctl$sock_ifreq(r0, 0x893f, &(0x7f0000000180)={'sit0\x00', @ifru_flags}) 10:24:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x40800, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x100) write(r1, &(0x7f0000000000)="2400000052001f0014f9f407000904ff0200070208000100ffffffff0800000000000006", 0x24) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000040a917c07e7ac1ed0c33c4ef37fac469c387c0f715aa766c9313f2a2a8b3a24745da317e7513179c43c10a7d0b394fabf2024df73b777d0cc003f9ba2fb760e4e71e01758a9dbe83037c98463732fe2183a233338f4779c0819634d83f51aee3469b96"], 0x48) 10:24:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000"}, 0x24) [ 159.568268] binder: 6290:6292 transaction failed 29189/-22, size 0-0 line 3012 [ 159.576527] SELinux: failed to load policy [ 159.589809] binder: 6290:6292 transaction failed 29189/-22, size 0-0 line 3012 [ 159.598734] binder: undelivered TRANSACTION_ERROR: 29189 [ 159.640446] binder: undelivered TRANSACTION_ERROR: 29189 [ 159.703867] SELinux: failed to load policy 10:24:20 executing program 2: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:20 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000340)="6d656d6f72792e6576656e7473009b85e21c54554362b5dea19f74e6754a82087e3cba83c58e6aaffb1f14db931979b0dd870836b61d68a7dc3a4c959ab6767b528b916b8f8da2f7324536bdc01df09a389602ed770fcfbc70bb784bacb3c34ade5e9cd5edde1eaf8125b45ac2f832c95cc7d6b2093a5326857cc759c815e88226ad1c40e566861a0097a65ea0ed9408f6a5a7c3a5d85b3235c67bbde65406a8effa24405e5568179253e39c6e2a83fd", 0x7a05, 0x1700) getsockname$netlink(r3, &(0x7f0000000140), &(0x7f0000000300)=0xc) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x0, 0x0, 0x1000f2) r5 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) utimensat(r2, &(0x7f0000000240)='./bus\x00', &(0x7f0000000280)={{0x77359400}, {0x77359400}}, 0x100) sendfile(r5, r5, 0x0, 0x8000fffffffe) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:24:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000142504005e7b"}, 0x2e) 10:24:20 executing program 1: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, 0x0) rt_sigtimedwait(&(0x7f00000000c0), 0x0, 0x0, 0x8) r0 = getpid() r1 = socket(0x10, 0x802, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) write(r1, &(0x7f0000000180)="3c2dc8bb167c94e86d64fa86d3d5a35b86cc9e358371671e5e48e067eb7f7c2aaf53c6d3a0df744269dd44bf32711974aa6d82d5c4d557a18258042f19a5313348902f541cd2c768cb110cc9eec885046f493075d9a482f8f27e0aea14168341b7ca033a5995cf46ff882e801b225148ca150473fc8621ce9a14569896199281da37ef2e52c6092969f673f7913580fd4320ede04f9831cec0c674ca36f0167ea4be7e9fb910b2267322392e0d8c7607f3568984bde1c5e6b3189c41cc86e73f5711060fff85c6ea54fe1f9de70ef6204d445ad01a02ff38dbad0eef7e4082360c16a3607673fce336fe332338", 0xed) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) setregid(0x0, r2) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) vmsplice(r1, &(0x7f0000000140)=[{0x0}], 0x1, 0x0) ptrace$poke(0x4, r0, &(0x7f0000000280), 0x0) 10:24:20 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000"}, 0x24) [ 159.824878] SELinux: failed to load policy [ 159.825700] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31766 sclass=netlink_route_socket pig=6324 comm=syz-executor1 10:24:20 executing program 2: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:20 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000340)="6d656d6f72792e6576656e7473009b85e21c54554362b5dea19f74e6754a82087e3cba83c58e6aaffb1f14db931979b0dd870836b61d68a7dc3a4c959ab6767b528b916b8f8da2f7324536bdc01df09a389602ed770fcfbc70bb784bacb3c34ade5e9cd5edde1eaf8125b45ac2f832c95cc7d6b2093a5326857cc759c815e88226ad1c40e566861a0097a65ea0ed9408f6a5a7c3a5d85b3235c67bbde65406a8effa24405e5568179253e39c6e2a83fd", 0x7a05, 0x1700) getsockname$netlink(r3, &(0x7f0000000140), &(0x7f0000000300)=0xc) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r4, 0x0, 0x0, 0x1000f2) r5 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) utimensat(r2, &(0x7f0000000240)='./bus\x00', &(0x7f0000000280)={{0x77359400}, {0x77359400}}, 0x100) sendfile(r5, r5, 0x0, 0x8000fffffffe) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 160.019326] SELinux: failed to load policy [ 160.666659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31766 sclass=netlink_route_socket pig=6345 comm=syz-executor1 10:24:22 executing program 5: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000001}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x24, r1, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x24}}, 0x0) 10:24:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000"}, 0x24) 10:24:22 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:22 executing program 2: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:22 executing program 4: r0 = memfd_create(&(0x7f0000000580)="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", 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) exit(0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @local}, 0x10) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000003c0)={0x1, 0x1, [@random="afc79af0da68"]}) sendmmsg(r1, &(0x7f00000010c0), 0x0, 0x40400d4) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='cifs\x00', 0x1000000, &(0x7f00000001c0)='system-vboxnet0md5sum\x00') mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000001040)=""/4096) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="2f4f05000000ff00000000f39afa295838c97e60ff97ad25a8bb08aead9c38a0fce0ebd39a010279a8d9551f3a63aae1c67cdd39a0270cf147f0"], 0x0, 0x0, 0x100000, 0x0) listen(r0, 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_mcast\x00') preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) 10:24:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x80000) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x36c}, 0x1, 0x0, 0x0, 0x40}, 0x40091) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000100)=[{0x81}, {0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) [ 162.583092] SELinux: failed to load policy 10:24:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000"}, 0x24) 10:24:23 executing program 1: socket$key(0xf, 0x3, 0x2) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000040)={0x0, 0x8}) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000000000000000000600000003030000000000000000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000040000"], 0x80}}, 0x0) [ 162.676429] SELinux: failed to load policy 10:24:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f00000006000014"}, 0x29) 10:24:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x22402) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000340)='highspeed\x00', 0xa) r2 = getpid() r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setpgid(r2, r2) ftruncate(r3, 0x8200) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r5 = getpid() getpgid(0x0) rt_tgsigqueueinfo(r5, r5, 0x1e, &(0x7f0000000240)={0x14, 0x2, 0x8, 0x9}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x80000000012, r4, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r6, 0x5421, &(0x7f0000000040)=0x8ad) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f000074fffc)=0x3, 0x4) r7 = dup(r6) setsockopt$inet6_tcp_int(r7, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000080)=0x412, 0x4) setsockopt$inet6_int(r6, 0x29, 0x35, &(0x7f00000000c0)=0x6, 0x4) setns(r4, 0x17fffffc) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000100)={'bridge_slave_0\x00', 0x1502}) ioctl$int_in(r6, 0x5452, &(0x7f0000000000)=0x7) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000280)={0x8, {{0xa, 0x4e24, 0x7f, @loopback, 0x9cd}}}, 0x88) sendto$inet6(r6, &(0x7f0000e77fff), 0x0, 0x20000008, 0x0, 0x0) r8 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendfile(r7, r8, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$EVIOCGREP(r0, 0x80084504, &(0x7f0000000100)=""/124) 10:24:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000"}, 0x24) 10:24:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000"}, 0x24) 10:24:23 executing program 5: stat(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) r0 = request_key(0x0, 0x0, &(0x7f0000000500)=')eth1-\x00', 0xfffffffffffffffc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setxattr$security_capability(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='security.capability\x00', &(0x7f00000002c0)=@v2={0x2000000, [{0xfffffffffffffe00}, {0xfffffffffffffe00, 0x4}]}, 0x14, 0x2) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000180)={0x9, 0x2, 0x5, 0x7, 0xffffffff00000001, 0x2, 0x96, 0xfffffffffffffff8, 0xffffffffffff1ec2, 0x9}) signalfd(r1, &(0x7f0000000200)={0x80}, 0x8) keyctl$chown(0x4, r0, 0x0, 0x0) stat(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, 0x0, r2) prctl$PR_GET_CHILD_SUBREAPER(0x25) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socket$inet6(0xa, 0x0, 0x2000007ff7fffa) r4 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/access\x00', 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffe7c, &(0x7f00000004c0)) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000140)={0x33, @dev={0xac, 0x14, 0x14, 0x20}, 0x4e23, 0x4, 'rr\x00', 0x2, 0x7, 0x27}, 0x2c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r4, 0x2, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = dup(r5) read$eventfd(r6, &(0x7f0000000400), 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, 0x0, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f00000003c0)='sit0\x00', 0x8) r7 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ioctl$VT_OPENQRY(r7, 0x5600, &(0x7f0000000300)) ftruncate(r7, 0x2008002) sendfile(r6, r7, &(0x7f0000d83ff8), 0x8000fffffffe) 10:24:23 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000"}, 0x24) 10:24:23 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000"}, 0x24) 10:24:24 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) ioctl$int_in(r0, 0x200000000, &(0x7f0000000040)) 10:24:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x84, r1, 0x0, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xa7a}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x2c}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x2}}]}]}, 0x84}}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001680)=@nfc, 0x80, &(0x7f0000001780)=[{&(0x7f0000001700)=""/91, 0xfffffffffffffeac}], 0x10000000000003ad, 0x0, 0x3cb5585a97177ec3}, 0x1}], 0x1, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000002c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/anycast6\x00') preadv(r3, &(0x7f0000000140), 0x391, 0x0) 10:24:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000000600"}, 0x27) 10:24:24 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:24 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xfffff, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:logrotate_exec_t:s0\x00', 0x26, 0x1) 10:24:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000600)="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", 0x0) r2 = getpgrp(0xffffffffffffffff) fcntl$lock(r1, 0x7, &(0x7f0000000300)={0x0, 0x0, 0x4, 0x6, r2}) pwritev(r1, &(0x7f00000000c0), 0x0, 0x81806) r3 = open(&(0x7f0000000000)='./file0\x00', 0x50000, 0xc) sendfile(r0, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$netlink(0x10, 0x3, 0xc) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:dhcpc_state_t:s0\x00', 0x23, 0x2) write$cgroup_pid(r6, &(0x7f0000000080), 0xffffff09) recvmmsg(r4, &(0x7f0000003140)=[{{&(0x7f0000000500)=@ipx, 0x5, 0x0}}], 0xea, 0x0, &(0x7f0000000100)) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') ioctl$sock_proto_private(r4, 0x89e0, &(0x7f0000000740)="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") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000a00)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000b00)={{{@in6=@local, @in=@remote, 0x4e24, 0x5, 0x4e22, 0x0, 0xa, 0x20, 0x20, 0x32, r9, r10}, {0x6, 0x7, 0x691a0681, 0x4, 0x6, 0x400, 0x3f}, {0x0, 0x3, 0x7f, 0x200}, 0x9, 0x6e6bb6, 0x1, 0x0, 0x0, 0x3}, {{@in6=@loopback, 0x4d6, 0x33}, 0xa, @in6=@loopback, 0x3506, 0x2, 0x0, 0x3, 0x7, 0x1, 0x3}}, 0xe8) preadv(r8, &(0x7f00000017c0), 0x1a1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(r0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000980)={&(0x7f0000ff7000/0x6000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f00000008c0)="c356ce1d90048d4628a4131c1e4b89b836357c1340232dcc98ece48121eac7abb0b23dcbbfb48b75ac31a2b8141a54bd9ea1d8a34b47f7ce0988edac6e175dec3dd519389872df9c211423e021c65a1f4bd0227f6faae5ba27a51408b3ffed56b54b272a0920ad9b949134889331c0fe4dc5782305392b269ee1e65bba775a2428e048deffd30609b6ffa8", 0x8b, r3}, 0x68) splice(r7, &(0x7f0000000840), r5, &(0x7f0000000880), 0xff, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0x4000001) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x3) 10:24:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x10000000000001f9}, 0x68) read$eventfd(r1, &(0x7f00000001c0), 0x8) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8000fffffffe) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x63, 0x1, 0x80000000, "0118d96ab4ce31767b3a7dfd200f84e3", "3e213a3b5427724aabe74c9887f5ef1780dfb9f0d8eb1694e1954868dadfc49834b2227c7772e25ff50d4b145909bbc8c6346f68e1cdadf098df4999e1af644a0e164ee8461cfd19dc92796d3a74"}, 0x63, 0x2) [ 164.477734] audit: type=1400 audit(1544091864.819:39): avc: denied { create } for pid=6414 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 164.514150] sel_write_load: 4 callbacks suppressed [ 164.514155] SELinux: failed to load policy 10:24:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) socket$packet(0x11, 0x0, 0x300) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000280)='/dev/keychord\x00', 0x101080, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000002c0)={{0x3, 0x1, 0x584ec529, 0x2, 0x6}}) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r4) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x5) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000040)={0xfffffffffffff000, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x3}) r6 = dup3(r5, r4, 0x0) write$UHID_INPUT(r6, &(0x7f0000001640)={0x8, "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", 0x1000}, 0x1006) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="84718cad88a13bff0f8068ec24af0d0d72393b3326c38bd06efd1e86e5f8"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000003d00)={0x0, @dev, @remote}, &(0x7f0000003d40)=0xc) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000480)={0x1, &(0x7f0000000340)=[{0x4}]}) recvfrom(r2, &(0x7f00000003c0)=""/170, 0xaa, 0x40000160, &(0x7f0000005f00)=@hci={0x1f, r7}, 0x80) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file1\x00', 0x7, 0x2) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003740)={0x0, @multicast1, @dev}, &(0x7f0000003780)=0xc) rmdir(&(0x7f0000000380)='./file0\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003dc0)={{{@in6=@remote, @in6=@mcast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000003ec0)=0xe8) inotify_init() openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) timer_create(0x7, &(0x7f00000004c0)={0x0, 0x9, 0x5}, &(0x7f0000000500)=0x0) timer_gettime(r9, &(0x7f0000000540)) bind$packet(r1, &(0x7f00000001c0)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 10:24:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000000600"}, 0x27) 10:24:24 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:25 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x9, 0x20101) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={"00000000000000000000000002000303", 0x5002}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) write$P9_RXATTRCREATE(r4, &(0x7f0000000140)={0x383}, 0x7) sendfile(r0, r2, 0x0, 0x6) r5 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) ioctl$TIOCGSOFTCAR(r5, 0x5419, 0x0) 10:24:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000300)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') ioctl$KDENABIO(r1, 0x4b36) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x8000000009, 0x0, &(0x7f0000000100)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) 10:24:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000000600"}, 0x27) [ 164.605625] audit: type=1400 audit(1544091864.819:40): avc: denied { write } for pid=6414 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 164.623584] SELinux: failed to load policy 10:24:25 executing program 2: ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)=0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0xffffffffffffffff, 0xfffffffffffffffe) fcntl$getown(r0, 0x9) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f00000000c0)="9829464916f4ce78aff6d558cd4dd077a40ce2c56f150e3c74a1129ae8153b193b235f390987c751c14fd2b5668b97a343d8475b7812f9c3d3c39813d1e54aa170a98ce7e0f538e6538c353c53ccc1e2adeeb707114d8b29b6846b37931b045ae2f3d1fde716bdb41117d83c2fa4eb874d1e4b8b4d4cb3d7177abea284751b01f610d32d79c4b17c185ee456cfb665edc137c68f02176179ba6372d1e5cc0d18f73b59079c4ff8a49c813f8d5188afcd6be305f5a4a8cbb7a68f939dd8928922b866b579094f2c222204dca405e9964d883100adf1e4d3b85c548539514bfadbe3b331df9ed079aabf353b0c6ae4d21312c111c25b", 0xf5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3, 0x1, 0x0, 0x10001}, 0x20) [ 164.707129] SELinux: failed to load policy 10:24:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:25 executing program 1: geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000001c0)={0x9, 0xd9a6, 0xff, 0x6, 0x5768, 0x2}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x100) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000040)={0x5}) r4 = dup2(0xffffffffffffffff, r2) socket$inet6_tcp(0xa, 0x1, 0x0) close(r4) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) r5 = request_key(&(0x7f0000000300)='ceph\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)='rootcontext', 0xfffffffffffffffa) keyctl$get_security(0x11, r5, &(0x7f0000000440)=""/16, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x10) mount$bpf(0x0, &(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='bpf\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="726f6f74636f6e746578743d73746166665f752c636f6e746578743d757365725f752c0061ac21bb3d7bec0c84811d2d25f9b844effbd449918e024d2fc2e1d00cc7ea6a62846af7d79a2bb41b8a7734"]) [ 164.815801] SELinux: failed to load policy 10:24:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000000600"}, 0x27) [ 164.892267] SELinux: failed to load policy [ 164.942628] SELinux: security_context_str_to_sid(user_u) failed for (dev bpf, type bpf) errno=-22 [ 164.962221] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 165.014853] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 10:24:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000600)="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", 0x0) r2 = getpgrp(0xffffffffffffffff) fcntl$lock(r1, 0x7, &(0x7f0000000300)={0x0, 0x0, 0x4, 0x6, r2}) pwritev(r1, &(0x7f00000000c0), 0x0, 0x81806) r3 = open(&(0x7f0000000000)='./file0\x00', 0x50000, 0xc) sendfile(r0, r1, &(0x7f0000000240)=0x4800, 0x20000102000007) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) r5 = socket$netlink(0x10, 0x3, 0xc) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:dhcpc_state_t:s0\x00', 0x23, 0x2) write$cgroup_pid(r6, &(0x7f0000000080), 0xffffff09) recvmmsg(r4, &(0x7f0000003140)=[{{&(0x7f0000000500)=@ipx, 0x5, 0x0}}], 0xea, 0x0, &(0x7f0000000100)) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='stat\x00') ioctl$sock_proto_private(r4, 0x89e0, &(0x7f0000000740)="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") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000a00)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000b00)={{{@in6=@local, @in=@remote, 0x4e24, 0x5, 0x4e22, 0x0, 0xa, 0x20, 0x20, 0x32, r9, r10}, {0x6, 0x7, 0x691a0681, 0x4, 0x6, 0x400, 0x3f}, {0x0, 0x3, 0x7f, 0x200}, 0x9, 0x6e6bb6, 0x1, 0x0, 0x0, 0x3}, {{@in6=@loopback, 0x4d6, 0x33}, 0xa, @in6=@loopback, 0x3506, 0x2, 0x0, 0x3, 0x7, 0x1, 0x3}}, 0xe8) preadv(r8, &(0x7f00000017c0), 0x1a1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fdatasync(r0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000980)={&(0x7f0000ff7000/0x6000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f00000008c0)="c356ce1d90048d4628a4131c1e4b89b836357c1340232dcc98ece48121eac7abb0b23dcbbfb48b75ac31a2b8141a54bd9ea1d8a34b47f7ce0988edac6e175dec3dd519389872df9c211423e021c65a1f4bd0227f6faae5ba27a51408b3ffed56b54b272a0920ad9b949134889331c0fe4dc5782305392b269ee1e65bba775a2428e048deffd30609b6ffa8", 0x8b, r3}, 0x68) splice(r7, &(0x7f0000000840), r5, &(0x7f0000000880), 0xff, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x660c, 0x4000001) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x3) 10:24:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000000600"}, 0x27) 10:24:25 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x400, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x3) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f00000002c0)=0x1ff) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000140), 0x4) write$selinux_load(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x27f) epoll_create1(0x80000) fsetxattr$security_smack_transmute(r1, &(0x7f0000000500)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=ANY=[]}}, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000680)) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/user\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) creat(0x0, 0x40) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0xf) ioctl$LOOP_CLR_FD(r0, 0x4c01) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000340)={[], 0xa41, 0x80000000, 0x100000000, 0x1, 0x1, r3}) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) 10:24:25 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:25 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x9, 0x20101) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={"00000000000000000000000002000303", 0x5002}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) write$P9_RXATTRCREATE(r4, &(0x7f0000000140)={0x383}, 0x7) sendfile(r0, r2, 0x0, 0x6) r5 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) ioctl$TIOCGSOFTCAR(r5, 0x5419, 0x0) 10:24:25 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') umount2(&(0x7f00000011c0)='./file0\x00', 0x4) clock_nanosleep(0x7, 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000100)) [ 165.381825] SELinux: failed to load policy 10:24:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f0000000600"}, 0x27) 10:24:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000002e000000d5000000000001ff9500000000000000"], &(0x7f0000000240)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) socketpair(0x8, 0x0, 0x65, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000180)=0x4) init_module(&(0x7f0000000000)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x96, &(0x7f0000000300)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2") [ 165.461214] SELinux: failed to load policy 10:24:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "d8a2a9ba96ffc320000000"}, 0x1b) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x220000, 0x0) getgroups(0x9, &(0x7f0000000080)=[0x0, 0xffffffffffffffff, 0xee00, 0xee00, 0xee00, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) [ 165.523564] SELinux: failed to load policy 10:24:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) gettid() ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000100)={'\x00', 0x5}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x0, 0x0, 0x100000001, 0x0, r1}, 0x1c) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') recvmmsg(r0, &(0x7f0000008500)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000002c0)=""/19, 0x13}, {&(0x7f0000000300)=""/4, 0x4}, {&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/31, 0x1f}, {&(0x7f00000003c0)=""/191, 0xbf}], 0x5, 0x0, 0x0, 0xbd05}, 0x7}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000500)=""/227, 0xe3}, {&(0x7f0000000600)=""/106, 0x6a}], 0x2, &(0x7f00000006c0), 0x0, 0x1}, 0x9}, {{&(0x7f0000000700)=@rc, 0x80, &(0x7f0000003980)=[{&(0x7f0000000780)=""/33, 0x21}, {&(0x7f00000007c0)=""/70, 0x46}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000002900)=""/127, 0x7f}, {&(0x7f0000002980)=""/4096, 0x1000}], 0x7, &(0x7f0000003a00)=""/48, 0x30, 0x30}, 0x800}, {{&(0x7f0000003a40)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003ac0)=""/232, 0xe8}, {&(0x7f0000003bc0)=""/238, 0xee}, {&(0x7f0000003cc0)=""/1, 0x1}, {&(0x7f0000003d00)=""/16, 0x10}, {&(0x7f0000003d40)=""/27, 0x1b}, {&(0x7f0000003d80)=""/234, 0xea}, {&(0x7f0000003e80)=""/115, 0x73}], 0x7, &(0x7f0000003f80)=""/215, 0xd7, 0x7d5}, 0xffff}, {{&(0x7f0000004080)=@hci, 0x80, &(0x7f00000053c0)=[{&(0x7f0000004100)=""/4096, 0x1000}, {&(0x7f0000005100)=""/65, 0x41}, {&(0x7f0000005180)=""/29, 0x1d}, {&(0x7f00000051c0)=""/204, 0xcc}, {&(0x7f00000052c0)=""/218, 0xda}], 0x5, &(0x7f0000005440)=""/253, 0xfd, 0x4}, 0x7}, {{&(0x7f0000005540)=@ethernet={0x0, @random}, 0x80, &(0x7f0000006900)=[{&(0x7f00000055c0)=""/218, 0xda}, {&(0x7f00000056c0)=""/196, 0xc4}, {&(0x7f00000057c0)=""/4096, 0x1000}, {&(0x7f00000067c0)=""/154, 0x9a}, {&(0x7f0000006880)=""/100, 0x64}], 0x5, &(0x7f0000006980)=""/31, 0x1f, 0x1}, 0x1}, {{0x0, 0x0, &(0x7f0000007bc0)=[{&(0x7f00000069c0)=""/179, 0xb3}, {&(0x7f0000006a80)=""/241, 0xf1}, {&(0x7f0000006b80)=""/4096, 0x1000}, {&(0x7f0000007b80)=""/7, 0x7}], 0x4, &(0x7f0000007c00)=""/166, 0xa6, 0x7fffffff}, 0x8000}, {{&(0x7f0000007cc0)=@pppol2tp, 0x80, &(0x7f0000007e80)=[{&(0x7f0000007d40)=""/4, 0x4}, {&(0x7f0000007d80)=""/207, 0xcf}], 0x2, 0x0, 0x0, 0x80000001}, 0xffffffffffff6e7e}, {{0x0, 0x0, &(0x7f0000008180)=[{&(0x7f0000007ec0)=""/191, 0xbf}, {&(0x7f0000007f80)=""/127, 0x7f}, {&(0x7f0000008000)=""/1, 0x1}, {&(0x7f0000008040)=""/234, 0xea}, {&(0x7f0000008140)=""/50, 0x32}], 0x5, &(0x7f0000008200)=""/204, 0xcc, 0x8}, 0x2}, {{0x0, 0x0, &(0x7f00000083c0)=[{&(0x7f0000008300)=""/143, 0x8f}], 0x1, &(0x7f0000008400)=""/254, 0xfe, 0x100}, 0x3}], 0xa, 0x10000, &(0x7f0000008780)) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000087c0)={0x0, @dev}, &(0x7f0000008800)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000008900)={@loopback}, &(0x7f0000008940)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f00000089c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000008a00)=0x14) recvmmsg(r0, &(0x7f000000a5c0)=[{{&(0x7f0000008b80)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000008d80)=[{&(0x7f0000008c00)=""/18, 0x12}, {&(0x7f0000008c40)=""/7, 0x7}, {&(0x7f0000008c80)=""/112, 0x70}, {&(0x7f0000008d00)=""/106, 0x174}], 0x4, &(0x7f0000008dc0)=""/119, 0x77, 0x4}, 0x80}, {{0x0, 0x364, &(0x7f0000008f40)=[{&(0x7f0000008e40)=""/160, 0xa0}, {&(0x7f0000008f00)=""/49, 0x31}], 0x2, &(0x7f0000008f80)=""/169, 0xa9, 0x1}, 0xfba}, {{&(0x7f0000009040)=@can, 0x80, &(0x7f00000091c0)=[{&(0x7f00000090c0)=""/203, 0xcb}], 0x1, &(0x7f0000009200)=""/36, 0x24, 0x7}, 0x8}, {{0x0, 0x0, &(0x7f000000a340)=[{&(0x7f0000009240)=""/195, 0xffffffffffffffb8}, {&(0x7f0000009340)=""/4096, 0x1000}], 0x2, &(0x7f000000a380)=""/55, 0x37, 0x5}, 0x4234}, {{&(0x7f000000a3c0)=@un=@abs, 0x80, &(0x7f000000a580)=[{&(0x7f000000a440)=""/35, 0x23}, {&(0x7f000000a480)=""/235, 0xeb}], 0x2, 0x0, 0x0, 0x5}, 0x603}], 0x5, 0x40, 0x0) recvmmsg(r0, &(0x7f000000ea40)=[{{&(0x7f000000aa40)=@l2, 0x80, &(0x7f000000ad40)=[{&(0x7f000000aac0)=""/249, 0xf9}, {&(0x7f000000abc0)=""/234, 0xea}, {&(0x7f000000acc0)=""/102, 0x66}], 0x3, &(0x7f000000ad80)=""/37, 0x25, 0x8}, 0x1f}, {{0x0, 0x0, &(0x7f000000af00)=[{&(0x7f000000adc0)=""/150, 0x96}, {&(0x7f000000ae80)=""/82, 0x52}], 0x2, &(0x7f000000af40), 0x0, 0x1}, 0x8}, {{&(0x7f000000af80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f000000b080)=[{&(0x7f000000b000)=""/82, 0x52}], 0x1, &(0x7f000000b0c0)=""/4096, 0x1000, 0xffffffffffffff90}, 0xffffffff}, {{&(0x7f000000c0c0)=@sco, 0x80, &(0x7f000000c5c0)=[{&(0x7f000000c140)=""/188, 0xbc}, {&(0x7f000000c200)=""/142, 0x8e}, {&(0x7f000000c2c0)=""/209, 0xd1}, {&(0x7f000000c3c0)=""/82, 0x52}, {&(0x7f000000c440)=""/118, 0x76}, {&(0x7f000000c4c0)=""/48, 0x30}, {&(0x7f000000c500)=""/141, 0x8d}], 0x7, &(0x7f000000c640), 0x0, 0x1}, 0x281}, {{&(0x7f000000c680)=@can, 0x80, &(0x7f000000e980)=[{&(0x7f000000c700)=""/9, 0x9}, {&(0x7f000000c740)}, {&(0x7f000000c780)=""/89, 0x59}, {&(0x7f000000c800)=""/202, 0xca}, {&(0x7f000000c900)=""/4096, 0x1000}, {&(0x7f000000d900)=""/78, 0x4e}, {&(0x7f000000d980)=""/4096, 0x1000}], 0x7, &(0x7f000000ea00)=""/26, 0x1a, 0x280000000}, 0x8}], 0x5, 0x2140, &(0x7f000000eb80)={0x0, 0x1c9c380}) recvmmsg(r0, &(0x7f0000013840)=[{{&(0x7f0000010300)=@nl, 0x80, &(0x7f0000010440)=[{&(0x7f0000010380)=""/5, 0x5}, {&(0x7f00000103c0)=""/96, 0x60}], 0x2, &(0x7f0000010480)=""/139, 0x8b, 0x9}, 0x5}, {{&(0x7f0000010540)=@nfc_llcp, 0x80, &(0x7f0000010980)=[{&(0x7f00000105c0)=""/39, 0x27}, {&(0x7f0000010600)=""/92, 0x5c}, {&(0x7f0000010680)=""/244, 0xf4}, {&(0x7f0000010780)=""/20, 0x14}, {&(0x7f00000107c0)=""/151, 0x97}, {&(0x7f0000010880)=""/57, 0x39}, {&(0x7f00000108c0)=""/152, 0x98}], 0x7, &(0x7f0000010a00)=""/52, 0x34, 0x8}, 0x6}, {{&(0x7f0000010a40)=@ipx, 0x80, &(0x7f0000010fc0)=[{&(0x7f0000010ac0)=""/12, 0xc}, {&(0x7f0000010b00)=""/118, 0x76}, {&(0x7f0000010b80)=""/19, 0x13}, {&(0x7f0000010bc0)=""/254, 0xfe}, {&(0x7f0000010cc0)=""/58, 0x3a}, {&(0x7f0000010d00)=""/38, 0x26}, {&(0x7f0000010d40)=""/224, 0xe0}, {&(0x7f0000010e40)=""/171, 0xab}, {&(0x7f0000010f00)=""/171, 0xab}], 0x9, &(0x7f0000011080)=""/30, 0x1e, 0x3d}, 0x9cb9}, {{&(0x7f00000110c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000013200)=[{&(0x7f0000011140)=""/4096, 0x1000}, {&(0x7f0000012140)=""/4096, 0x1000}, {&(0x7f0000013140)=""/182, 0xb6}], 0x3, &(0x7f0000013240)=""/248, 0xf8, 0x8}}, {{&(0x7f0000013340)=@hci, 0x80, &(0x7f00000133c0), 0x0, &(0x7f0000013400), 0x0, 0xfffffffffffffffa}, 0xbecb}, {{0x0, 0x0, &(0x7f00000134c0)=[{&(0x7f0000013440)=""/126, 0x7e}], 0x1, &(0x7f0000013500)=""/100, 0x64, 0xfff}}, {{&(0x7f0000013580)=@alg, 0x80, &(0x7f00000137c0)=[{&(0x7f0000013600)=""/88, 0x58}, {&(0x7f0000013680)=""/119, 0x77}, {&(0x7f0000013700)=""/168, 0xa8}], 0x3, &(0x7f0000013800)=""/53, 0x35}, 0x20}], 0x7, 0x23, &(0x7f0000013a00)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000013b80)={{{@in6, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000013c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000013d80)={'team0\x00'}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000013f00)={0x0, @dev, @dev}, &(0x7f0000013f40)=0xc) eventfd2(0x0, 0xfffffffffffffffd) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/llc\x00') ioctl$UI_DEV_DESTROY(r3, 0x5502) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000040)={0x7, 0x8, 0x8000, 0x0, 0x8}) [ 165.548115] SELinux: failed to load policy 10:24:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) [ 165.585452] audit: type=1400 audit(1544091865.929:41): avc: denied { module_load } for pid=6499 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=system permissive=1 10:24:26 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000001480)={0x100, 0x81, 0x100000000, 0x8, 0x5, 0x5}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) set_thread_area(&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0xf05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x7fffffff, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffffc, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') clone(0x0, &(0x7f0000000240)="6c36cac29b14e4ccd3f0faa0feda0d", &(0x7f00000016c0), &(0x7f0000000500), &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$fou(&(0x7f0000001a00)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000001ac0)={&(0x7f00000019c0), 0xc, &(0x7f0000001a80)={&(0x7f0000001b00)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) writev(r2, &(0x7f0000001640)=[{&(0x7f00000015c0)}], 0x1) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) set_thread_area(&(0x7f0000000180)={0x40, 0x100000, 0x1400, 0x0, 0x2, 0x0, 0x38a7ba40, 0x3, 0x6, 0x2ab000000000000}) r4 = add_key(&(0x7f0000001800)='big_key\x00', &(0x7f0000001840)={'syz', 0x2}, &(0x7f00000018c0)="b5e4dfbb46cfa8c8d01c07174c0336fdd20b72400309b9e2b19fdd42bbc4125a69df0b24b1e2c23b41d209de74d23099", 0x30, 0xfffffffffffffffc) keyctl$clear(0x7, r4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001340)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000280)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000001440)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) syz_emit_ethernet(0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="0180c20000000180c200000381002800004a6bf0581120e700000000000000000000104c1edb2b4aab6f1e7c49e3a4266a6dce8622333e438e1812148c6330b116708ad89bca32d724f4a6f010955f6a69f76157a8d1b4b86f75d486d1b9ef2ec976d43512d1e9826ccffc19ff2fb43ae3b972b92171853e801deb9c00e9a17428046f9ec97124ed3347cbef272c1f21a91c707a6368b2a2ad89166297"], &(0x7f0000000200)={0x1, 0x1, [0x9af, 0x3e2, 0x16a, 0x2be]}) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000012c0)) getdents64(0xffffffffffffffff, &(0x7f00000002c0)=""/4096, 0x1000) sendmmsg(r2, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f00000002c0)}}], 0x388, 0x0) dup2(r2, r3) [ 165.658542] SELinux: failed to load policy 10:24:26 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:26 executing program 1: syz_open_procfs(0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x12, 0x5) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400102, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@local, 0x3b0d, 0x1, 0x2, 0x1, 0x4, 0x9, 0x91}, 0x20) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 10:24:26 executing program 4: setrlimit(0x400000000000007, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000006c000000000000009500001700000000"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0x12f, &(0x7f000000cf3d)=""/195}, 0x48) 10:24:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x7c957d371538e228, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x0, &(0x7f0000acbff8)}, 0x10) bind$inet6(r0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) recvfrom$packet(r1, &(0x7f0000000100)=""/66, 0x42, 0x2, &(0x7f0000000180)={0x11, 0xd, r2, 0x1, 0xfffffffffffffe01, 0x6, @broadcast}, 0x14) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0xffffffffffffffcd) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) dup2(r0, r0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x3fffffd, 0x0, 0x0) r3 = socket$inet(0x2, 0x3, 0x3) shutdown(r3, 0x1) dup3(r3, r3, 0x80000) recvmmsg(r3, &(0x7f00000066c0), 0x0, 0x10, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)="6370757365742e6566666563746900655f6d656d73003d6fa0b93866ee48a84906841b17d11b40781d04c575c4cc3f7e02e9fee634472f085ac793b30ed1055fc0078c4a17c1d8975e8709f38ffc6ff97fe4a03bc88eb05c9bd85bda408a7efaa3da27654c7f7bae3f7042823a64368a8256b65ac7b83b9131b349a79b1060c56296258ee794629bb823ef12c492ace72f443685", 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r4, 0x0, 0x8, &(0x7f00000001c0)='bridge0\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r5, &(0x7f0000000280)='net\x00') ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000340)={0x38, 0x0, 0x0, 0x0, 0x6}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$full(0xffffffffffffff9c, 0x0, 0x8000, 0x0) fdatasync(r4) ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000240)='bridge0\x00') 10:24:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000700)='./file0/file0\x00', 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000007fc0)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000001640), 0x4) mkdir(0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000040)=""/233) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) 10:24:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)="2e1ec7861b9364de2c794b689ac767bb8a50ef0610a36b43df8ba3640e26d9e005e7c8bd1aaf1769d0b8ae9c9980961068f1a444aa6e1b2253d7d896c1c6857927dae6df6a40ea90c7b2ab7a7e0df40c19819d22d89b412e6ffde7fd08400a50d8d343c7d9f82258dbc625a703574e16228f520e0bba406d29afda26085d0ffe29f64c52de9444043af74b2ee1c2560f7ed8f8380cf69cb5d3657917dcf632ea3f99b7a02caa2b31f3c332faf8cadd6b277849ea3a76f5c4c8591ed0b3bd89fb14c47e49c2f3c56c5c81576d614017cd2b9dc8844e5be4ef07c116fe2ce8f8d213a8d456cdf7", 0xe6}, {&(0x7f0000000500)="1be2161d", 0x4}], 0x2, &(0x7f0000000580)=[{0x80, 0x0, 0x4, "244045924ae6f2ae81f43fbe6f2d36a07b2f8a415716cfcd97d9dcf6966e5d03f31361abe01d0ad4ce4cc04be81037f8ec0d8389530b42cd85e1f9e6253037dc5ba2caa966833199a5e636b26f139da6be9a07d228d7c5300323afc2fa5c21d5b60fc6e29c07355ac167216ffbd2a1"}, {0x20, 0x89, 0x5, "d09e713b34e110fe1efbad96"}, {0x58, 0x0, 0x6, "857d99f05d77e251aa0dbc1bf16700015f16906d21cfce77a1b85a5648815a7667ea711c80b1206248d7974bbe7124029fc7e61fd6d8c2ba6354ea7f38896d62d7b9391336"}, {0x48, 0x11f, 0xaf64, "53a52e303336137bcc107e3761a71ed81748b6594ec7b34d13d75dc993a426ba4eda9d8166bbf77b38a393d5446fd6db4809c6"}], 0x140, 0x40}, 0x42b7}, {{&(0x7f00000006c0)=@sco={0x1f, {0x6, 0xffff, 0x8, 0x40, 0x2, 0x7ebb}}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000740)="5aad8eb55470194a6debd996c151a4926eb679aa60e537543da264380f06e4f88a3f4327d8889a211fa98d4957928649c778c4da3fb12cbdbba9e5e5f670c935b7267fb6da0bed8fad979f92beffe9bc6826548effed1d5e145ab6e2f1092b91ec265cdcf7c8b30b910f7b15dbe8f93fdb32f18ab0ca744ee87a5c8a02f9358c9f7144e0c900c9c46ee97624efe44ab563f63a79f69711b1df417146d7e4d9", 0x9f}, {&(0x7f0000000800)="a974647ad10eef4ff6", 0x9}, {&(0x7f0000000840)="082c6f1f7268c5519ddabeface4932f6f20667dff73f09518dc69e1e852c46c4fab0a631f12d685c2f62408998d105da8108a387369aba3c1e242d1f58b53f8882ee26e5bbcc0f9eb18098a5576682e21cb2dd4ea8ffd3e316222c7a7bd8b6c653c48c772e513fc4945a90ff36bf896fd299d22c25a6e1016066df7ffa7a08dd9dbdd580d5b284dc7bae82ca89ab542c60d20a1360d512389e3a4044fdf127c3f5aa2e9d4cafedb767905a56", 0xac}, {&(0x7f0000000900)="57a5d0f21b95682ba5abb766e6838ea7210c4f40af21b8fdcd7fc2d173ab824b36a961604a2ec42bca210f0df490c76c6ff2415c3ee27f15ab10c7e36a970d1d0708c59bd6d2d4bf7c15aaa23db9539782f196f53c70aa75c391617c111fc52257646282b7a1ccdf2d3c0ef63facefab7ace895125501c41a81973e575f747e7aa19e430dfbb5f903f156876766253b492d2ac1dd3e776737dfd8c5780c486e573bf9669f2f53a047045d059afed0ebfd1a9cf00f12505c866883ddd7b55185a1d824b", 0xc3}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000001a00)="d4bf0362d031f1919d87e55fcb9934c9b68fdbad07f43a3927906813128b2aced3e35519111b0dfc2a5b78434c22276a284f691e22ac7bc1405a8b4087bacdfe1d1d23e4b62ee3d1728b7f7c2a8a6e218eb855ee4743577bce9c150b7a7bdcb2717eed", 0x63}, {&(0x7f0000001a80)="afb158cc932e52266dfb4833a516956cab464b87d5a87ae39b3e407feef13bc1aa3b46865e23f11af54a15db765ac19980bdf57da4c0d7c18671d81136c6a12013e70901151bfb031cc2d13c62d3e61162431a1d711e68b777522e8fada6e1f6e71cd53666a892c2b99f96a270b5c95e764d04d81ac15c62d5c2b08770a7a7349533a5e051328fe96943f1f6abcdb7299a69f195beda17f03645cc5a7b389aa001bb8109ab0ca006c79cf0457d4653ea1cfad04c8412e4991acccb2fe091a5afb19c47e0bbd1aaf806e0306fa7355544c30131e2cf11952efb820b97f89bc06887708c", 0xe3}, {&(0x7f0000001b80)="cd9b5ec1567b22647186a6de7d16d3f39b88000f2d90155dbb71fa", 0x1b}], 0x8, &(0x7f0000001c40)=[{0x70, 0x117, 0x800, "d140504dc30d071e700829e38940ae7153961156ab15966f9f4a4aaf5f3e8f9ebad4142fff4601354a60b64ea0d8ad11db5b72175ad0145a5b37160d9d46c291bde018725e8e172b289100fd1b000036bcdfea7e3e6a20b2b2beab603bd516"}, {0x38, 0x0, 0x81, "2dbce58ab668ed8416d384c96fdff061216cde73692ff5419d2fed6e9c5d28a67d96a8f8014cd2"}, {0x20, 0x111, 0x6, "27f29c182fcd1c9a07fe"}, {0x30, 0x11d, 0x5, "e2f87bf6ba54adca8f8037f7c0307e6e29a23e11201ff1f25fd3ccbb6cfb84"}, {0x10, 0x84, 0x7}], 0x108, 0x40000}, 0x3}, {{&(0x7f0000001d80)=@nfc={0x27, 0x0, 0x0, 0x5}, 0x80, &(0x7f0000001e00), 0x0, &(0x7f0000001e40)=[{0xa0, 0x115, 0x8, "17b8d3b97e5b8771b9b16d6b892cb89499e5347146c072470635bb6fb2ad2252de65e2948dbd6e2e668e2160104554915a89b523c402b6a496e42f28e078717d91d5acc7ccda244f4580f573e9897447c584fb13745b37169287ac468243b592f922055ff232ac9d9cfd8051c1bcccb426d8d27e38669d877d7f0b745e6a29d7ab4650e1b80198e70eff8751"}, {0x98, 0x1ff, 0x8, "78b8cdd392004ba25201af901e83068b071b4ffac42f6de7d096b717b7828c4007a79f676513a2ce829043b0095a3650ca778924251e076478dc00d5cf032a5e75fae5af596901f0bd430530316212f078fda031ddb25de88fea755a37a79c1ee67f9ae4cc0392f2034a97370fbfb4eaed03bcc7fe756f9d6cfbca29c8e1b77ddeb80e"}], 0x138, 0x20004040}, 0x9}, {{&(0x7f0000001f80)=@llc={0x1a, 0x205, 0x6, 0x80, 0x3, 0x8, @remote}, 0x80, &(0x7f0000002440)=[{&(0x7f0000002000)="7f24fa2482bbb0b4dfc6b43ad63754cca26c1c9d3fc05740f9ffdd949a60a78f92a5a93de10cdb2c9c3a25d6ebccfb280d1cdfefb53e602a91e7d0d08283a7bfa0ac18ce0f352ed09044315269b547421cb3f12f6124527eef1724516d679ea19492452fd9f4a2e90e35ba3388be8bc4410e2db8c301dab12d1cf1fe", 0x7c}, {&(0x7f0000002080)="869672ee61748513d19509e46bb17db24d6682dcce6020822572f1bf799006680925ed35856896fddf26869cf8bb9ecf9725c6bd8aa9635950bfaad9df4a3f2324c727d315a6b01853f5a5d004236a882a6e9281a65afe416570588dc22adb970e5afd3629f371764ede71c3f4601dd99579f72345e6d26803057866429cb7d3fd", 0x81}, {&(0x7f0000002140)="5b94356656b201be4be69457fa36fd8081963b6c1e1f69f36dce701d893ee92c8ee546f612b0abac00e778c68a231f62186c479afd8dad8079684656b04bd21f95944b228f52715f414d135853876d863c1e54b523447acea6992f3a4256900f2846f3", 0x63}, {&(0x7f00000021c0)="725bd9e46689a40087c4f2cc75f1233bcff187e8ae965d427a74cb404080e5258b861bd54f60d2674e74864982849a22ce003b24dd6e3dac95e7e620ded9dd6ad9e0e8ae11e94991a965ed523b29fe2ac9d89da74bbc529eb0cdd9d9a32888bda77b6f9661f6a6b1082e7ab50e162bf5c3276147d473e260bf5cf82f7e23606dd4d069c3ffaa9a39b872300fa3cae050cf2e07fa904f3ba86a7021e617af1b60ee0851b8f6ef7a9a5327e3f578016ae8a50509e21da317ae20eb833e5d39e28dbdd5ef38f7", 0xc5}, {&(0x7f00000022c0)="bbc7e59cedb5b33fac7c9f3f06f38a2d0e2842eb0c34cffd6bd499c09529e0749d2737a9f45201bed7cadce07490d878819108f8ce0895eaf8b4a4deedfbdcae72", 0x41}, {&(0x7f0000002340)="9d34a5fda306f5398cf61b49aac4a6ffa8a18d5d60a6dd54e3d6a47a21692909a06a11ccf55b089e7c0f017e801c83bb775214df54206af16b208af19ec5480a725dc9f48f2b4e4f4cb37edcd7d83fe2f5253733e5fd605b320ffe61cb6990dbb45555a4afa51f8918e78c199f69a200c8dfab34d92fd9defa21da653d8ebd18b1a496512c4e61702c09cf876e3edac70d82f166ecc7e9a5c928740265f419853f686ec539cd5290db1ab7a26e69cd940ecbf70fb9a929746a4712a92fc6458280c3aa3b1b7fffcacf0594fc77e5bb56133c932402a0ddbc189c6c8251540f14540f394764ae7051", 0xe8}], 0x6, &(0x7f00000024c0)=[{0x38, 0x105, 0x42, "b170386ec6d6f903284465ec28fedd658215fc7739c5db001395deb0e450a9a3ed6e"}, {0x40, 0x113, 0x3, "3bddda0e24aa94227699b7fe752c30bd822b37a91cf6d0966e04bc3ad7719b968eadfaba992cad761b01c60c3cb7"}, {0x108, 0x0, 0x2, "b405a1c9a5b5d4186107256ce60ff2905279d697aad05b997be12bca7b6feaea4fda8d26b2258562027a351553b64d37ce6f4c23ae9cf28f0f6f3215fc7359759a79ed5c9116f00badbb3e8a6e35621cc625cf3fcebcadc7261641a864b38781ccbfd1e91edbaa3ac1bb371bf1fde74da8d20628f6c4a6e0307e0c8442ff756a3e4d6fa8f45e21f38c62520a9a6d0b5444d6f2723a27c36f70284fb56667400f2db348bcee346e7a33ab088605cf144f1de6c27d42857e477ae5d4cc9d794ffbb8f58dc09d014a91ef90cd48e3f4618a442864eeae3c2269a39a0f779ba44e8b09c09ed160f2c72eee944d07181daccf48"}, {0xa0, 0x10f, 0x9, "4352d9a895095ce84950afaa705c6dc54146a29caaf43b5eca47c84e566276c2ad03c0cae6970b73e300a04b3b6d65703d3469f77eeb68cff710e12a779942569aa007bed6d8296c35952e20f9bb849e9b80644927d75171512d3e863c273f92b99fe6a145617d918f601a8212036cd6bb60327c9b139a6c2874e9e6bb556f9bea11faeb1ec1b3e560c441a8693c32"}, {0xc0, 0x10d, 0x8, "8b496f01e11359792a3baf64958057aacb0bf77a903235a9f5a2464182f7b19b1c1650fdff658aed5532fa701727f94dad07ffc24928839565d3966d7fe3f82fda4816b03ddeb6f231aa05fb90ce0c957c7302034c5cb1084880c83037adace1b8593d703dcd316bb7ff78518c72a5421b28511af5080562f5c568d51fcece37e85de68e5a55ad17692fb4a2b2c430e721fb3563f4859d539cbb276a5e090da42be175cc7bf8f091a8e6515fc8"}, {0x100, 0x19d, 0x9, "51553a346c4cf32a3241d1e5901bf7d407ab343d3bdbddf23bf7e2129f9d2f64ffa0afd83297da54293931761b8de498a137d01d67eaee2792db996e49bdcfa5b13dc84723ec3100080e60343778ac6472cae24ee4a3bedf091c605f0c8ece9803987112815ca626ea99c8a542b74876525a55cdc34eb782843bf2fa37c120c208472fe2bebff90076a3cca5a37aa78f19a7d20bd7be3067d7cea638a3ca4108fccc181150d5a5ff08b69bc572bc8401beaee7083f6460f59ea68daceb71783af1bcce8ca1aa5967bf5daecf616fedd92e923eb7d0d7c35bf7855e31204ae67a604c23162df6ec94d6d03757cc9820ac"}, {0xe8, 0x11a, 0x7, "3dfb698d3e99c004fd2f112d5a79413bc8594a9e6b422afdcf3dc8343d7be2eb4241fee1391aaa47df327639a73904463974155fdc67bf6a966f3d0bbd54c9856ce481fe21cc0a2e4e09d0bae638740511088b146a46b8fb9e1f4c596795372e5af0bb1747e4d71409263515100c48a39c874b218837e93ab673ffee3687051cdaa8ae8e04d785d7f1e15dbadff66e22ad4fa75c0ad302334ea471a459c5b84c35e2d6d875fd0f16db50c96bbcb147d0884bfd436b44ac31ae92a780710aff312cf8a86679a304f06900f0007d0ceea38d11765f"}, {0x18, 0x109, 0x0, "6fbe20f7f7e505"}], 0x4e0, 0x81}, 0x35}, {{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f00000029c0)="246548b4e53a8c6908d8d383b47ea0692c93689722a34981", 0x18}, {&(0x7f0000002a00)="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", 0xfc}, {&(0x7f0000002b00)="9e464038805e18149ca8fc8398e728935fe8848367c7020c9eb33aca3d12a7309abda1be38dc266f63d0f46267f8a3f99390907e6975968be67af090f7342bdac734d2dfbe3434f8042031682958c27307916af313ab670c1b9a0891beb78854e82115bd9cbf8fbd502a312050f26e94a95ebd5620aac839f948c61eac62554e27d058999318df937d32a9590ba7e0f52560b965af133a6af6ac0f96b7bec1c1a1e5f7", 0xa3}, {&(0x7f0000002bc0)="c6433a69a3943c07e49680dc3ec5d61f2253e98431941fb5bd7cad2f2838a2cd313e6b32b1f86e557027ad4d217145f53eabeab411729769f3dbac3883ab3d0c6a48ea735c49076126f771469b4a14732e115b22a0e788e2263cd392d7aabd23e516eb09400bfc439350d096eea6b22463087d9c98fc01a5d6cb21715ee352d4b32ff2524d32d1acd1c72892a2a611e5a1262e", 0x93}, {&(0x7f0000002c80)="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", 0xfb}, {&(0x7f0000002d80)="ffe9a17ce8358c9a3117c50c6573feaacbcadb6d564eb4fdf546057bcb5377ca56ed1019a3ab469eb333d1600063458bab5c6312c16ba7099526073a5e5b2cd756ac6e82711da12678b89f773dcd5fcf519e29e0e4e76f6abfb7493714608f232ea158a52998f25bc5a1f6ca24ac2b8e85d9e3521d7909607e4a7673c34d3f6aeccd046524c7aaa27eb332740764dedc46cc0c8e7a1860", 0x97}, {&(0x7f0000002e40)="79ad03337f69ec35bb3b75cce9188079f1385d322653138bacf0d4334e177a8a7cdbec938df85d3c5680149ab63e96e26480c9e31e42b986d6db0607f0b9e4abf5b7a73c103e6f50ff1adea0fd42224e3923ff44d679eeb064e72dc486e5241d029d3108eacea8ec7575954ff72a1be1a3b6b05af577e1074ac873597b27e5468af31dc1969f9253ac01aa29e08ba8b269eb91b75cb7d55231a46a73423444655735687d00de88ac0139dee2dd05ece7fbba6951ad7a0a27593f4a99af43cc899e419d6bccf9cb51aa31ba7b8ad63756452415542c449f28a165a58813a5ce0d8dbe67b3d4", 0xe5}], 0x7, &(0x7f0000002fc0)=[{0x20, 0x19b, 0x8000, "8649a9812a65d0819d04e253140e"}, {0x100, 0x100, 0x8, "6ef3c336d02a8d66848df8fdb2ccdb15a59943bb4ed7dfa3351e68c9be84e38642ae804eee9d453a0c3509a05bccb27b2c783375099a5cd96b45dd5cfeb588c9742fef4b0a99975578a3339e88e31b7b19ee17aafe567efe8f73d48cda624ec59fa07f1bcf7066683f6e46dc6650fbd5674c6b4f7f3e46d877d2dbee7850fd7a9add7f2a9cc7e9efb49fcfc4138df89a7342905aac9ec64b5948dd2e261a42a4ec756b25b355ea0a67a5f88652819d384f6b3d83e9ad64aba44274d634e15b929504b49b1697c3a6bf007f6e787f1d3dd211778c1e8331b0414511eb27c7d8a06d8d22ad3f7f4b6d83c95bb8ab20"}, {0xb8, 0x10f, 0x1, "ead0f9e30547bf6b63b1a4b238649c47dcbf19652f258254535affcce60cae25ea59786dd1dfca466e4ad4b0c3f6529771293dce5afa05fcc0b8da6b499f30fdb443da80e4ef34dd12524f676967e55d3d6f4b9a027677626eb4f6cf5390ed701db6085d0db377203efd12e22aef63a622a455eccba18b330d132dacbce95309fc1afd326055302f8a9139c41cb37ddacca85dfbf332421a90680c18e8099240cc0636"}, {0x28, 0x19f, 0x400, "4b3844411d7e56f45c416080fdf4f0b16e6340ef"}], 0x200, 0x40}, 0xffffffff80000001}, {{&(0x7f00000031c0)=@un=@abs={0x0, 0x0, 0x4e24}, 0x80, &(0x7f0000005640)=[{&(0x7f0000003240)="64c8d444f4d56254acb854206c2c30d5d60b238cc82c4ca661ac38be9808e9615a4c3c934257b47394", 0x29}, {&(0x7f0000003280)="9d838246e52b375c7df65c691f18d2b3f76fab543bd68097fa276d4cb137398f2786fa90477e1a5c5444b8b207f5", 0x2e}, {&(0x7f00000032c0)="f36a8ee766d56e7ea279cfe8da7edea9aa0282f316302660d31fc9d33ab7eb563908f53aae3399425c53e089eb23e9911e02a7f7326f15ddb61748572d65a788dc2e7a22d921aa5867b9f1f2f464c9cc785fd989a53825ee12306290dad88131277023218d242a0061918c3d30c8af22b1f420d51d86be5299de9f0814e7c66311d7e5c0384dc65bc481cfc6d95b40ac44ca8d5b4e467240a22b814f061440fc94c2c405de621224979f0f772e3eedf2bba6c9b9be75720b402fab31dbdf6e621019a640fcbe7876d2", 0xc9}, {&(0x7f00000033c0)="e7ffba5bd158559fde35eaf7eefbf6e76b4d34892f1886fb8041cf2023b65de98e9151d03441bcccc7f503c8aa69b25d9d5e0068c7f487b2f4bd99a7c1c7820dc0a1432770e5651d009f05c9b2ecf973d2ab78c2aef1c1ed57c8d5d99838bc11b0fad051865e8a4a8d0932652869010573449b5763fdcced657c44c5a0ac6adfc857a275e2d63476e292fc16a207eaefa7383f49b16893b69bf7888c587916", 0x9f}, {&(0x7f0000003480)="231b339ee88590421af953f27efc5be7d10c30656b41131b98a07c8841462bb93cb32eb36218cd4c7a7217add5d8c2f459730d9afbbce5e07f365d56a95b1baf723cefc604de95476e2b0ca13250433575c924791951209210c13673b7b896f02ba6a752362497f01bbad65290e68f986e1e9cc1571cd2d9ff9ea6621392d769675c70b5cc4c46bbeaba90cb20884988b284575ea685a00ce9d92bff166bb1bdca2d999ccb92d68185c5f468292e457f3a4b11d240b15a93e25d7e258113c60148fb44f4d6ed24b445cb350258d4e363f140fcda9961ca240359d3751a383f036c2252f4454b07c2d0887e52b45f01012196e070bd9b4c50119f8f71efc46d85e1e94c335caae7c2585bac224d5177baa05d2329d897b82984774c347b6a1f4579ef0fd85c9eb029f84eb7c5e06fabd24118e2a8d53c3a78a5e22c09a0c93d8cc1d1d2e624a0f50acf9267bfe783349ce099ad12e79203bf47cfbc98df6319f35826be454e37d8dfe5aa9fd57bcca05c533c7e8c136f725d4bdf3ca6186a42d045b2e9291ca663441aa2ca27b11aa61865fb1e35baaaae58df815a9f424ec7377a6d2a211764fa13172a09d631f14a201fdb463fddc7514ff75859e607112d00db0ba466721ee6448ad059750dec61fb8b7814cbef572ef4d4698193ebe66535332681b9a66157ceecaec386d2b8973f6c3316d9a73908a16a9250006075004429927b458ebd3b521ac38c89e5c270e6488fdb0d21b472bc9bf1946833fd4b470b26bcae7365a0eb8eade04e3aefaebb9cddeddcc5c21af4ef99fb22a4a9c64e4824ef171fb8cf368e47e916f847017cd6733a659dbf987d97270b7e80b5cd57b81337959877d41eb89bc23b943a4aea00888c2a866252707f6233e11ca685dc1082f0e1a5e0bbedd0638d117edb5f9b43534ce4e60287e27b77f87383cdc9195455c2221450f11c84ec228def86833c019fe7447338f70bd44e9dc08ec7e176c7c72d7d6374b86d09ceaaeacd96aa9c1e78cdfb8245f8e6e330326c07e456c857fb2de117351318af6435a11c346f17b98b84283e476d41a818add9f18475626d06d0e16c7dba8e675efa7a2ea6f43b903a64bbf6e8501daf99e90d9cacc4b8e28d83b2fa4668b887d1f3ec3c16603d870701560f3e89a4456222fb8779f31bddeed13227cd84eb7d6decaf81a6abe7e52894acb36b08e0d61eb9d9db66cde36622a7960f8482f0d8434958cff76f6db5db3c102d51a1589605cf3da5b47fc4da1061e9c8368b4bbf37271450c779c6f5f22bc51edf5960cffc6d2ddabb68206d15397085db0d5674e337e0f7b769a9b30168aab4171039ec418402f0097adb63bfe4357b4b17dcb67424198c2f2334b3455340ecd6d2044c4574c3540f67f04e07a1e9a2e58a1288ad58e486aefcbcc47531e88bc68ef39a0a0477f0e36cea85e4ac9b8c395a846bb1eedeca3ca5953db345aea8beccb2e6c045028b5ca6d04635a1d7dadd2cdbee080ef6fafda74f31f7587309293a3d220964ded3a24c946309c1a7b7670c765208e8f5b31eb9604ef3c8786c306eee7dce6e4c2482ebd479606e236aeebd23a462a89e9c4b4d1672412fc84a82401de26dab7d551b3f7b94718aaf75cd3c2f067753092d546f1ca1c7ec26abe22b7be5ba59ccbd1716c1ebe4094a7ded16e8a7b9126675dc383e94a77bd7301d58a47e8061b795c40f22bcea9700228836c9d5ae7c193c3bf37a64efe96a98cebc963eea5640c0120b34b6a326f821a8c3a268da57f39fb4abaa439beb88ec29c8058a8121dbb150c75111879845387de213dfbd97f4fe731f6d896c2820d484452fd308727da5acb36c5c6a31a922612bd68191aa129936f8c5481430241cd2c30f0c217515db50c6ff4b5ed870a91d42eaa257ab811342ba061fe73100ef25a8b58f00e1da7a298026661ed435f626bfd54d78489df319bd7c0fde1c650bbb0b6dbc8d6f444b60042fa3f6f32a0eb23bc8eed559e893b658c78295c79aeeff7281912872da82206f4c0a72f914f430cda9e9d16ada7268fefbea7f90bdb586cdec066192edcc43bf9e603b3d8b5bb20e31e8c7d831af0532c4fef9fbc551c3e1cccea4ec22cdbcffce8ac5d9b2a1241a7bce66fea70739d90126e16944d87b08939fd50832af07d518c07d0c7164f9803de9c26118921bf97a5379314d5d49b6cf5464bf87fd784f832c6ea2a46beb61fca4f722ffacc9e166b1b0ab1d7ff565781cf655ff22002647cceafed30aa6e54cbd6405fcc4d80c8b757c4764363710dcf4a6cf9b647f2d3feacc83be3a4aaa13677ddfac161fbfbddaabcd7df4c2d9a596937ad4f99ae904b1b1b5f7423896f976cb846942f3af3527fc6afd5449f05dd153b42c8ae04bbcd1443d7f01fb76c5897a1d26f83c80be3fd2eb6545631e4b78571e8e5d5e3c785c59a3fbab73aa714eaeff2f391a5932e09003880d9bd0f19e94442e4cee80c73588a970928ef3e74322ae19773dd8a09577ec8594cd9fff362732bbbe1efbc4e5302ce731ee63b04cb23b7d0ee74569c03c543d8fbc9efebd4b79f7dda13db665eb7a53d693128b7ed17efbc2f1f3b47316d83b7227829fe6fa37e211b8fd9709d8a9ccc54398cd5373e9f4b4ceab6ae3b872eafcd3ac6fcdde3fb74c8b291e120dc27fe1194bf0998b9bcd0f84edb6ac12ec5843807a7d1cd9fb8458c98b1c280b55f0de1f995a3740a5140af25f3118e2d5d2ca0647a31aebe05fba08f2fa94ff6c131b963392b57cd4c76f44e66ba402442da4aab005c56b5497507962e7dd1408e18c04386cc3c1f411a81ada4c5678beaeb6b6e067ffbef34b8f3d4afc28d3ba123b4963bec6f87dd8e5a5b6035cfd22977005108510b6fc313ae689e2138f8ce1b5627789d1a102a523bd19e64476ede16effda6911dfa008c0ce86a5a5fec7aff09eee87c6967c29fd10653caf60b0cc17b760e0306af34bb8c1bf7e7a4cc87a608da35006e4a23f1ceab92479731d8147ced637a35ba598fc89e76be7ef29d6e47d1195312ff7d2d245067c98445b1fc898e99f54591398465e0719254fb65844a47c1e743fd9a74e39303dccd429d5e54498b5518c40c814313a2c1b16b5e078af52050720e7a438c6946777db64a34b2b732738841739479c84d03728c17f774fbe1782a4176bb70f373d93aa91fca466aacfff3e95eeac911e8bfd0c7001e64cb057328427353e3f7271f892d10f5b2ba734117b2507b9306187489a7c2492e6ca9aff2eddf56dbba5c9b5fff5d244d4adefe0ef2f5f036035753fe771985518712818110ed92219016636a986d54bc08f8d1b0bc5c9187dd79bc458d1435a0a9fa302de846a89906255f567d15d47008cda7838a0615d18af9f54a65a4f6fab7f23e9ded8b48041f2a7a73c2db893837bcee1ab26d57310fc6c68129831b3db246771d254d68a39137a30fe8b2980c7446319ab21eb604cd1391676a1ef197d11ec293a81f497bf9b1de48d01b2b3251f20e447d7343061e5a675395b45bc961c0db3d35126bd345331e3248004fff2ccdaf17e296f35422b6049e89a701c3ec1e20fa552a0e10bc2376dd3de3a072eefca4213e4e23e303a067165a6eca58ebd5cb1e642944c9f9b058a8dc721ce43eb8f0553c62d6fd0a282debde181d67c4071b0d401d879dead8ceefd95284f368071e70b5c9e176d162a3af0bbc11eae7e558598e4aa6ece813499e7f041486a8fb05aff0fbe51127375e5824887bfbe895d7b7adec41e76fef3164287c84f4a1491038ae7998306e797a56eec1d56810a41655dd524e5d94cabcd18deafe914bb54d2641e0c984ab78ec7f978ebb624184a48bcea3ed519704bad33f8e9bef0b5b547cfd37d7e7e2b830d0e64e52fc4bb514fdc1aaa7a37de7dead05924dea5367166c66c9785c54e78819a7dc4a97c114119ca2577a96580f83472be7fb4b4f3126e506e67d11b37de4d23b357ea5a34f7eb2ab81ca9d298b1e2d508f11819b6f6e0c91f8a31d170d32e4b0c3f718c5a6e341dbe7d3da60d352c70b985e8814b40af46c3ad69986aaa995eff7c74ff8db2f50f419ade89de0ebd0b0016edc5e390d0aaa09ddbcf55c9ce150b822712048ede37f57d7af6dc2875da548c5b6dae694dabd9e12454ec3eda87dbdde1c0732da311630ab3846c1d412c4437dde50e254c2a26eda1bd7511049e5b39b988b7be3356cfa79dfaa0adf59956c0eb43fe9082e81d485784b9c5f1078267943d139f93208353bf7025d2c03ac6f768aa939cfd76b18ebb76a3469082010cff020da743bb9cf7d199407f770cc3fd8ceddf2bed3bb586c37a9f966ed662d7fdc6a11d4cf04505266d381c6c4fd6677c0a7b183fc25fe87e8e790eea3d1bc588342669ca32efddbf850353f8ae500c313e674cec5d8df3c06806561ec7e0d5c4a9635be502e6a4b82ccfd87e789906ab64cacfc6d9f180cb1890507463f8a5a5aa219576133fed3c77d5df569637d9c513a20ae2a465644d1c79bae6565b2b099cdf5e3e4e8353c0d1e1db3c70b02a1362315a3800b07a77c9afa70efced63e65b3b94be30d595bb23f10ef8f4e0a4a4493812be431521ba1070852f3e20167f74a07a0a60ac3cbe5677cf0779d0d1b2a9cf16297bb9075aa608cb41ac571d7973ecf9fad29b96670821715f6e32ea20bb57df0c62c8354188270778eff77a21a43727e7d87a8ba034c54cca66bf20c7b37be8ec206dc38351f1462ad034052b375bcbf4596dd9205c0b64de4361f96bbea68d3036c975a20dfe84ed7673f988437f811612d5365840613bc9dc46958ab7bbd2ac5369b8bff00b1dfb31cf8461df5cb5fa7ef59a5364c972267d5411bf5ba1025e969e70bfad4b032b63d6a9662081d727a121a20b5a51a62b9fdb44ac55dc8ea401fbedeb2a7c7a3a3bec242aa0152769799a8e0455d86cb30e13db28caec0c3e5fcdb16511ecc024047708b7a8d81649b4c08f189738e55f84ca7c842ddded25e442d191ab945257e256b29225d672288c856c8cc7c449f785e434038899392320c03c54dd192610baa8ec73d8798a36dc0a652fe1351da0cfb0e2bd2034ba100520d11059f9b7534dce535edb520f086f742c34a924b180f1c89db0bfd45942a5e7284fc4a39be7e05060fb7966e948cc2d9b0ee28d7590b173ffe7676e6dbccc9899b0f7d7d0112bb3445b2bd408c2f1598f26f80c776cd1984c8edcf89b7859677428cc72b3af4142dc46e6c46b344e735df5c20044b27c6f08e7cd6c6e35b494e10b12b16f6d0b759fed0fb0c2918ba6b419bb02faf2d3429889f56fdb005af966a695a64ccfabb4b8864a5f63207e4c0a283af143575cdd3d1b59b2bbbbaf180dac91521e3bbbb0d318638c1c3ca93702a37286d0c2070d6914c47f0e72d907fc363b6ed246e5e9ca903f1d5769f9b67c6045eb121bf05f4c35acea38cd4bfec475a066655bc1e52f575d9a3f1bbd41df2788290130241f80fd2ef17b8ac277ced33d75665dd70e42119db8ce2cdd3c4f307135030a19cb711b5358734c10016f2335ea0564872b95a31f8f5545375838cd7643a137d14c7bf7d714c1292fb5dde1173f3648a1d7c484eaa7ecf5e53287d1343151f7113bae9bec73f5a2fec3156bf446eeba2576f74b674e83800beaed216c4e7a4cb4a10057a9e15d16fa4466a525d8fd2cc257a378e6ab6a59f6f54cca6f08ccc924bd7314274cbef9bfee0bb8743e1da62d05445d9d31da5cdc512467fd377dbe17ff5c29f5f2301d3896232d20edc0", 0x1000}, {&(0x7f0000004480)="380929ebe9880d670c520ea721e159c011957c4c5bb737aa1b8e4d060f1692f916f50ec334ec8edb165cae86", 0x2c}, {&(0x7f00000044c0)="3d6a5d344bc0235e8fd28abbda80e486d6b1a6d3a01a08102f039597876cec410c12cbaad6", 0x25}, {&(0x7f0000004500)="1a902c499745beb2063f4a95dd8e4f5675315159538bd4156ae8b5d8d9a05a66096991c72d97ee0525ab5649e71c319d5be98706c8bf27113f88835843ea92dc0d824b75cf19324871362701d6bbc1d099d1f8f869d6a02e255d5fb9d40b5018a49be5f93c5fa600f8fd2c2cb2a34f6f8a6a5eb19c45cfc40ee680708223c3c16b1d193d23b80d0c010359d992810c6c1ce4cdb9b8f1991535ed11ca0b668ef0be5c36186da48934b7ec6cdab783bcc3edb0de2f1ae0944e47b62d7905ec4482740ea1f95b77cd9612465cf5df6cd90342d3557f905d6bf4cf1570a8c97ee3059b87a7aecdc1819af956cde9", 0xec}, {&(0x7f0000004600)="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", 0x1000}, {&(0x7f0000005600)="d14ceead8f9e5f82ded5682eaa57dfab95", 0x11}], 0xa, 0x0, 0x0, 0x800}}], 0x6, 0x20000810) 10:24:26 executing program 4: futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f00006f7000)={0xfffffffffffffffc, 0x100000000000000}, &(0x7f0000000080), 0x2) clock_gettime(0x7, &(0x7f0000000040)) 10:24:26 executing program 0: prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:26 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000300), 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000000c0)={'dummy0\x00', {0x2, 0x4e21, @local}}) lstat(&(0x7f0000000500)='./bus/../file0\x00', &(0x7f0000000540)) getpid() getegid() gettid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000a00), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) write$P9_RREMOVE(r0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000140)={0x0, 0x0, 0x2, 0xe23, 0x6, 0x5, 0x4000, 0x10000, 0x1, 0x0, 0x9, 0x5a85}) 10:24:26 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/current\x00') write$input_event(r0, 0x0, 0x0) 10:24:26 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x3f) recvfrom$unix(r3, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000200)=@abs, 0x6e) fcntl$setown(r2, 0x8, r1) fcntl$setsig(r2, 0xa, 0x12) io_setup(0x8, &(0x7f0000000040)=0x0) r5 = dup3(r0, r2, 0x80000) io_submit(r4, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x8, r3, &(0x7f0000000140)="7d9765ee73ee7cba0666bb21a5901e2935fc03eba29c6748bdbb7004dab3827a327b6a305c5f1ce170eca9cf02df2e10afedd7994677ef5409d0e898f847bb17fc22cd016f129a418a733414750e15612aa4947ad314cd9d6794c233b508eb0b92efa7f1c4e63843bcbf246639042f20a21e06a18c1c22fbce4176839631f3f826e2f16f027ddf32c0064a466cd5c20489ac6061dd8eff298d4619b2a5fc5d2c8a88c035f70f5f31a0bbd3159e47aadc8e8301", 0xb3, 0x0, 0x0, 0x1, r5}]) r6 = dup2(r2, r3) write$P9_RSYMLINK(r6, &(0x7f0000000100)={0x14}, 0x14) 10:24:26 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x12, 0x0, 0x0, @multicast2=0xe0000001}}}}}, &(0x7f0000000200)) chroot(&(0x7f0000000000)='./file0\x00') 10:24:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xfffffe9c) 10:24:26 executing program 4: capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000080)) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) mkdir(&(0x7f0000000140)='./file0\x00', 0x144) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="62747280000000af38250e2158b307841fab2ba66657"], 0x0, 0x0) 10:24:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000080)=@ll, 0x14, &(0x7f0000000400), 0x0, &(0x7f0000000700)=""/150, 0x96}, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000100)=0x5, 0x4) fcntl$setpipe(r0, 0x407, 0x25) sendmsg$key(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02020800020000000000000000000000"], 0x10}}, 0x0) [ 166.526943] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) 10:24:27 executing program 4: r0 = socket(0x10000000000010, 0x3, 0x0) accept4$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x14, 0x80000) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@empty, r1}, 0x14) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f0000000280)=@ipv4_newroute={0x38, 0x18, 0xf01, 0x0, 0x0, {}, [@RTA_PREFSRC={0x8, 0x7, @multicast2}, @RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x0, @u32}}, @RTA_PRIORITY={0x8}]}, 0x38}}, 0x0) 10:24:27 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/75) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)=ANY=[], 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) 10:24:27 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:27 executing program 1: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:27 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x54, 0x0, &(0x7f0000000000)="fb864f96bc7153fc852bdc9ad8a8b0d44b9202e24d0e565010654ce82abbd739844a47f379443669cfdd5c8ed2a5f535070d6011846be5f3f82d95bcb2562351bd8c2bc1787c848e103c4b4793dfe42382a2e279"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="08631040"], 0x0, 0x0, 0x0}) 10:24:27 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r0 = gettid() r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x1, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYBLOB="e19d7ccd383f5333aa251f7404a1f17469adbfb4c517953010cb1df06864a104ea10bc0d69ac1a518c4b0d937e13237443a8e1783eeb5dbd22e3e84993085dde8a131ce851d342dbdf75fc353b564af7f67d9b81a10eaee32a151b69bef85c7400b044bceadae8d7f4706309747c8d13178ce443db6e1cea97fa71825172b88ac5ca4c5cdfe08097586298f9224a87a0c26cf7a2711eb768b0cf99d184b5312464e563e8ca7382102539b526ac30c0643a5780f63e82b08a7620092f41cac7c34ff54dda275661ce76bc4197eb23ff7e8fe55b8179fd77f701a8004c5d95283adadd25f273b50aad56926c67612922f11887b20d3b21071e867cc2b9", @ANYRESDEC=r2, @ANYRES64=r0, @ANYRESHEX=r2, @ANYRES16=r1, @ANYRESHEX=r1, @ANYRESHEX=r2, @ANYRES32=0x0, @ANYRES32]], 0x0}, 0x48) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x14) wait4(0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) [ 167.189148] syz-executor0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 167.205604] CPU: 0 PID: 6618 Comm: syz-executor0 Not tainted 4.14.86+ #16 [ 167.212537] Call Trace: [ 167.215146] dump_stack+0xb9/0x11b [ 167.218686] warn_alloc.cold.35+0x9d/0x1b7 [ 167.222906] ? zone_watermark_ok_safe+0x240/0x240 [ 167.227741] ? avc_has_perm+0x150/0x390 [ 167.231709] ? lock_downgrade+0x560/0x560 [ 167.235843] ? avc_has_perm+0x9e/0x390 [ 167.239718] ? check_preemption_disabled+0x34/0x1e0 [ 167.244735] __vmalloc_node_range+0x390/0x680 [ 167.249250] ? futex_wake+0x141/0x420 [ 167.253043] ? sel_write_load+0x1b5/0x1000 [ 167.257268] vmalloc+0x63/0x80 [ 167.260477] ? sel_write_load+0x1b5/0x1000 [ 167.264704] sel_write_load+0x1b5/0x1000 [ 167.268752] ? sel_read_bool+0x240/0x240 [ 167.272826] ? __lock_acquire+0x619/0x4320 [ 167.277055] ? kasan_slab_free+0xac/0x190 [ 167.281199] ? kmem_cache_free+0x12d/0x350 [ 167.285430] ? trace_hardirqs_on+0x10/0x10 [ 167.289651] ? __fdget_pos+0xa2/0xc0 [ 167.293357] __vfs_write+0xf4/0x5c0 [ 167.296962] ? sel_read_bool+0x240/0x240 [ 167.301037] ? kernel_read+0x110/0x110 [ 167.304928] ? rcu_read_lock_sched_held+0x102/0x120 [ 167.309927] vfs_write+0x17f/0x4d0 [ 167.313464] SyS_write+0xc2/0x1a0 [ 167.316897] ? SyS_read+0x1a0/0x1a0 [ 167.320510] ? do_clock_gettime+0xb0/0xb0 [ 167.324641] ? do_syscall_64+0x43/0x4b0 [ 167.328606] ? SyS_read+0x1a0/0x1a0 [ 167.332213] do_syscall_64+0x19b/0x4b0 10:24:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="913aabe095dc8ac728cbd750f1b6651f85c42c0ee2165d3abddedb9cfe27726d4b099c992020542a0f8ec0c2204cd6d317cfc73588d1c9023f2b61805d27845284d98cee85eef7efc15ca2f310b910bd7764e3f293a5f545a26e567c97cc09af6731ee45bf82571548a3684dab923dde7437584dd9e60ca140555bed7d6e932d7599a14000baa9a6ac41f34a91"], 0x8d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x10001) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x38) perf_event_open(&(0x7f000000a000)={0x6, 0x435, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x5c3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(r0, 0x0, r0, &(0x7f0000000280)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e24, 0x93f2, @local, 0x1}, 0x1c) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000003c0)={0x1, 0x0, {0x2f, 0x11, 0x3, 0xe, 0x0, 0x2, 0x5, 0x12d, 0x1}}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0x0, 0x200408d4, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x1c) vmsplice(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x3a, &(0x7f0000000100)="4b39168e", 0x4) sendto$inet6(r2, &(0x7f0000000000)="ccf96200", 0x4, 0x11, 0x0, 0x0) close(r2) [ 167.336087] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 167.341256] RIP: 0033:0x457569 [ 167.344425] RSP: 002b:00007fe9f5824c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 167.352114] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 167.359387] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 167.366633] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 167.373879] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9f58256d4 [ 167.381156] R13: 00000000004c5c5f R14: 00000000004d9e90 R15: 00000000ffffffff 10:24:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f00000000c0)=0x400100000002, 0x3) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000240)={0x10000, 0x200}) r2 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000002c0)) getsockopt$inet_tcp_buf(r2, 0x6, 0xb, 0x0, &(0x7f0000000100)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0xe}, 0x4}, 0x1c) getsockname$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000140)={0x0, r0, 0x3, 0xbb8f, 0x3523943, 0x8001}) [ 167.390347] Mem-Info: [ 167.393278] active_anon:95326 inactive_anon:28485 isolated_anon:0 [ 167.393278] active_file:22810 inactive_file:14382 isolated_file:0 [ 167.393278] unevictable:0 dirty:300 writeback:0 unstable:0 [ 167.393278] slab_reclaimable:6824 slab_unreclaimable:57804 [ 167.393278] mapped:55248 shmem:183 pagetables:1718 bounce:0 [ 167.393278] free:1358265 free_pcp:174 free_cma:0 [ 167.427180] Node 0 active_anon:381304kB inactive_anon:113940kB active_file:91240kB inactive_file:57528kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220992kB dirty:1200kB writeback:0kB shmem:732kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 167.450939] DMA32 free:3079672kB min:4792kB low:7868kB high:10944kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 167.477753] lowmem_reserve[]: 0 3437 3437 [ 167.481977] Normal free:2353292kB min:5480kB low:9000kB high:12520kB active_anon:381304kB inactive_anon:113940kB active_file:91240kB inactive_file:57528kB unevictable:0kB writepending:1204kB present:4718592kB managed:3521708kB mlocked:0kB kernel_stack:4576kB pagetables:6872kB bounce:0kB free_pcp:952kB local_pcp:352kB free_cma:0kB [ 167.511406] lowmem_reserve[]: 0 0 0 [ 167.515044] DMA32: 2*4kB (UM) 0*8kB 1*16kB (M) 1*32kB (U) 3*64kB (UM) 2*128kB (UM) 2*256kB (UM) 1*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 750*4096kB (M) = 3079672kB [ 167.529824] Normal: 3087*4kB (UME) 3319*8kB (UME) 2193*16kB (UME) 120*32kB (UM) 150*64kB (UME) 46*128kB (UM) 6*256kB (UME) 3*512kB (UM) 2*1024kB (UE) 1*2048kB (U) 550*4096kB (M) = 2353284kB [ 167.546969] 37375 total pagecache pages [ 167.551026] 0 pages in swap cache [ 167.554476] Swap cache stats: add 0, delete 0, find 0/0 [ 167.559828] Free swap = 0kB [ 167.562901] Total swap = 0kB [ 167.565999] 1965979 pages RAM [ 167.569108] 0 pages HighMem/MovableOnly [ 167.573501] 315634 pages reserved [ 167.579895] syz-executor0: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 167.591447] CPU: 1 PID: 6631 Comm: syz-executor0 Not tainted 4.14.86+ #16 [ 167.598386] Call Trace: [ 167.600988] dump_stack+0xb9/0x11b [ 167.604552] warn_alloc.cold.35+0x9d/0x1b7 [ 167.608798] ? zone_watermark_ok_safe+0x240/0x240 [ 167.613651] ? avc_has_perm+0x150/0x390 [ 167.617655] ? lock_downgrade+0x560/0x560 [ 167.621806] ? avc_has_perm+0x9e/0x390 [ 167.625698] ? check_preemption_disabled+0x34/0x1e0 [ 167.630737] __vmalloc_node_range+0x390/0x680 [ 167.635235] ? futex_wake+0x141/0x420 [ 167.639038] ? sel_write_load+0x1b5/0x1000 [ 167.643278] vmalloc+0x63/0x80 [ 167.646468] ? sel_write_load+0x1b5/0x1000 [ 167.650701] sel_write_load+0x1b5/0x1000 [ 167.654768] ? sel_read_bool+0x240/0x240 [ 167.658823] ? __lock_acquire+0x619/0x4320 [ 167.663060] ? kasan_slab_free+0xac/0x190 [ 167.667203] ? kmem_cache_free+0x12d/0x350 [ 167.671447] ? trace_hardirqs_on+0x10/0x10 [ 167.675683] ? __fdget_pos+0xa2/0xc0 [ 167.679405] __vfs_write+0xf4/0x5c0 [ 167.683049] ? sel_read_bool+0x240/0x240 [ 167.687112] ? kernel_read+0x110/0x110 [ 167.691030] ? rcu_read_lock_sched_held+0x102/0x120 [ 167.696052] vfs_write+0x17f/0x4d0 [ 167.699607] SyS_write+0xc2/0x1a0 [ 167.703060] ? SyS_read+0x1a0/0x1a0 [ 167.706685] ? do_clock_gettime+0xb0/0xb0 [ 167.710844] ? do_syscall_64+0x43/0x4b0 [ 167.714837] ? SyS_read+0x1a0/0x1a0 [ 167.718458] do_syscall_64+0x19b/0x4b0 [ 167.722350] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 167.727533] RIP: 0033:0x457569 [ 167.730748] RSP: 002b:00007fe9f5803c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 10:24:28 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:28 executing program 1: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) [ 167.738471] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 167.745735] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000005 [ 167.753003] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 167.760263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9f58046d4 [ 167.767526] R13: 00000000004c5c5f R14: 00000000004d9e90 R15: 00000000ffffffff 10:24:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) socketpair(0x2, 0x80005, 0x8001, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000180)={0xfb3b}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x8001, 0x9, 0xffffffffffffff81, 0x9}) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cffdb5e80f3da7cf908005345204c696e7578f3ffffffff61000006000000070000003c9f00000006008e0000992285a3017eab1212f04d714b9077d9b38c8125bbff4bd7d73886705457670980e3d3a896a7baa0c1bd3c40f93ada8a38ede7032a7ae9324ffa330beee439bfb152187c7418137b80b40cc407ab3d1fc6c1ea3986af271d590f9d374ae8db25027448ee29680b1af22fb50abd72fe87a86b00ce806b5a1f603a411365cc44c5e50c592191a97bbfa7c382f46eed7d5aac13e760"], 0x28) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) rt_sigsuspend(&(0x7f0000000140)={0x2d}, 0x8) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x3, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) 10:24:28 executing program 4: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x2e, @rand_addr=0xffff, 0x4e1f, 0x4, 'lc\x00', 0x0, 0x0, 0x9}, 0x2c) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', @ifru_flags}) 10:24:28 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:28 executing program 2: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@bridge_getneigh={0x20, 0x1e, 0x303, 0x0, 0x0, {0xc00}}, 0x20}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000021c0)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast2}}, &(0x7f00000022c0)=0xe8) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000037c0)={'syz', 0x3}, &(0x7f0000003800)="8266c813b3a6abc54b2a0f15427e0573567447df57e4204a0b41bc", 0x1b, 0xfffffffffffffffe) r3 = request_key(&(0x7f0000003900)='user\x00', &(0x7f0000003940)={'syz', 0x3}, &(0x7f0000003980)='(bdev\x00', 0xfffffffffffffffa) keyctl$instantiate_iov(0x14, r2, &(0x7f00000038c0)=[{&(0x7f0000003840)="d3b0f12cd2760db5ed24056998f17215d84c3d5bb8a32d5ab930f5959932d3dca5f093dda6e644982c944271b5374b75f2ad597d3c76a9f1fc7cbffd6269a2a0a9d299b0b0ea5d2535a6f1e7acb29be609db7eee8a976273d4f8f9a8572560d4a91ae653e326c2a862f3221c3ee3", 0x6e}], 0x1, r3) sendmmsg(r0, &(0x7f00000036c0)=[{{&(0x7f0000000000)=@ipx={0x4, 0x80, 0xff, "506d4e7c00cb", 0x5}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="b1b682dbf185eab4c221cca88d4c943761cb0140b66a0cf68ba08e6e5a28555631563dfc581cd357c612e3db24d047a0ac10537ff8bdbd7f866ef81dec1c21fd498c54c7bb830b806350bca7208b5932da5f6d9824e010dae58eef7e72b280fc74ea62b61242307674c8c108974222b245e4c43131db085215fdb7514a347c0bca2fc873f724171717acea0077a1611d2a555c2097e8c0a5f3d92419dd908a40", 0xa0}, {&(0x7f00000002c0)="c05fa8a834e89b90681dbacf648e7946eb4c7253d4751c8da7c2beee5985c7249d454516369f6ab35861438ac1724a64c1ec0146d4dbc315c149a3c19049b51088a81ebe9c5a89755845a63f9e9a48f925106f7cc546422bd1767cbbbb9df4142112fe67023f4bf2d1e90089583dd6fbbf6e2492fac4b981ae9b34128f0aceeb3bb678101fdb0a3491859baa694c04e324879457c5fa86624b9770ce9daa91caa93348f912ff3d5473d147313af036948bd905d3b25354957d32d396cd985e4acbe07d1d200c010282815c958b8689fa8e36f131ce97e30f5c8bede03eede48f4ce62e2dc3c5f2108d655e503ed86b21", 0xf0}, {&(0x7f00000003c0)="ce1b98e47c01e76fd4873c62cea428fcc9308a891c15ed2f5917b2976fb48eb9cdd8fb9f5e9390292a0160a78b0a58d01e75f7291b99e847b0c6b676d720505b72d51d7c8db95088f7318539dc69563e8f02eb79f43a39035f9078d7d73709ee057005aaf8f7029c1360317e104ccdb93f32fbbbed2a9c18be681e48f3a178e4627d60cacbc185ec1a83a295dd579b2c78a62668ae8b6a23f60c6e91dd96e93ad924f59bf31c14dbe9388e06e67b5bd81ec92275d7210ae8dd1c19ab5c7cec4476214b11a055f26ee8e3f072128510c3ba96d31ffd22cac60af8999a9e0136ed", 0xe0}, {&(0x7f00000004c0)="9b705daad7b2c6e2c48652ab0949f8e07bbf332dd38d8d4f41638709a3aeb331bd10fdaa865c99cb2d33ddd66261326b558c9d8d41a1aee6aafaf28538d6afbf79078fc86d2ccd01144e81f7be3042a1bda7f5d6b2dc6fe525d8bde561233473af7b66ce64527af67fe9cf4567728982077d045ab1a62187e15a735216e383dc0f92d1cbc4438ace699736dfb123ee0b951215b2d200a2da776a5dbf218db44f8862b0e98b72433042e539e78e1a01e814222d0410ae8dcd0657c958e10054693b", 0xc1}], 0x5, 0x0, 0x0, 0x8000}, 0x2}, {{&(0x7f0000000640)=@ipx={0x4, 0x4, 0x8, "81882cf7ebd7", 0x1}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000006c0)="7a112ecd6f7a5346b66c3ee389557bc725b9eb3281aaa2be7e4f55cd9957dd5515c784d6547a470d4fb2f52cf5f95540ffcac6e90de602ce437e43c656a3fb70381f1aea97d003b6adf18631e144dbc14cd060b90ce2aa15b58601d3be70240e3a0c3076db70a259e3b1c2fc89eb5ef9b356fba38473298dc725b01933e2b7f1c9547571beeb1225e826833de0c51fa32be517d140af14830b6eff0965742e38e28455", 0xa3}, {&(0x7f0000000780)="1c476e0cf8257f0124dbf6213e1e25efad8a1e8d6928a23fdcd361496581c32dde9685de6b224af7995229ba086335955964377e75cd72b6fb4233c7aa70ad08e8e4ecce5e7663fb8ebc2c1798b62373ba17dbdea662f6d5d5b4ab0392d4fab02a0a9a20f978e3655d2ec2c204d04553", 0x70}, {&(0x7f0000000800)="8038ff687670ff6abb9742cead2348e4e6fde038bc4de9c4a6a41abf8e546b02eaa61141d1e38dcf06b14244e605ccf1b85565d03f81188ae47b96d7db462401bf91dc23502dbfb1bfe2e6c9cf9c40e9d483249d857b1ca7d5ab32acc9e44a1a7f211fa6609e25dc78dc4e4f8ebd216d43e4e446067044410bb7fd7a6299c657a63780e76721b86e5918f4a8a31146ef60fa9c96a716dd1e8d7e480bbb47cb07e81487eded2ef1", 0xa7}, {&(0x7f00000008c0)="c015e420f02cdb355efe551c4cb986212266245112093559d1f0af491348a8a3d7a89d08e3e63ffc7a27245c1dc914211ec3c4ec6bc0fb612f41273f188b96aece96d596a92371f0bc15c8d6778e226def941b3ede5a2382a9616fd8a05f04a73eb7d36edeb9bba366037824fdcc71", 0x6f}], 0x4, &(0x7f0000000940)=[{0x58, 0x100, 0x200, "c029d06665871a6ddee0d4954b680f5732a82d1c856ad73effa20396e2fb29b8b1eb102a22fc9140a21b329f1853789cf163906c8e1b8f3ea21c7b7adb90e32babff"}], 0x58, 0x20000000}, 0x1c0000000000}, {{&(0x7f00000009c0)=@llc={0x1a, 0x33b, 0x20, 0x3f, 0x0, 0x80000000, @local}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000240)="d752b9c6ccf033b90dbbb551ea4f035ab8ad142a7cc9e49d734be7e148d9aff4343e71e8", 0x24}, {&(0x7f0000000a40)="6841b647e6a12ff8e00e794a3a398d7239960f5375f95f7ae487bc201351e54862ef565d3fa11f9aa48edf0b5b78b820e13166033539cab4d4be435fb5368c9993fcf29c38c1f3a4311d72b2c3bcc645cda1fac2015b6768ddd31137a55c2f89151dfebb58c477e1c06984949a45109773f09d219ca542f8e49d8b7e4165c1d0d4b6aa49f66ba12c2d5957271f8ad1b7e30860c4a4be2e88f63fedfbca7cca3f0b91a29f820e10dfbf11b3b572018d1edbd9c9649f3787466b8e005fd91ea322ece8fc8a70a4a1e5a6d03b1e4eb8f416da7a095b018ddff1cd2914a21a0648b9fb6af282d92d6cb5dcf47492a39b5015d13e88d75d", 0xf5}, {&(0x7f0000000b40)="af239df82fa99ee98bfe1170c4592528fe82f15fdf2bfac13c6fb1fa88f1582c7242a83fa1e1710e5aa1b8c8c2ce12542288990210734b82df0905337bcc2067a65fd5aa13438c3f0dce5f57e141a98acab9df348c906beb98e8183f56bfe2160b566e85bcf81697367deb0e0aaafe3f107bdcf51ee559aab03a791c856de695a584", 0x82}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000001c00)="cb886451cc944af33c0c9e1eebfa9b75d8f830bbc05dddc4ba7f7c27dcce585d90ac182dbfbb7a1e6b9cde972b654e9724bebff05cfb8f1c7a042f864bc4124bd1b222ce5b55345b6e724e3ea8bf70015af6175908b8abf776ae055154f2aeee50e915833fc3cb6a0d5d72d24d6e66e4cd6fe030f7b3d43c03f2998ca59cfc6b02ec0089c7eca0ff068b85898aeaeda19856bdff74aa38ce9336", 0x9a}, {&(0x7f0000001cc0)="1ac66d1c426d18875a6454c430c659af0da4de5967cca44eae46f6d4f2e47ad08b823d20d9e93aef2cfc34e292b53925a4476a35b445c7511306b2dbde7f85a9c09418", 0x43}, {&(0x7f0000001d40)="6daf606ff80defb04ac2544323d0c9386eab76ac4ae33be64c32c8b8579fa589544b8440a59b86fa2150", 0x2a}, {&(0x7f0000001d80)="3f13e6839134987a098260cedf10f6475432cfda72fa13c14ec062224f98527ad9f091bec2156bfc2296066844fbaff36e5dfbe04e161b263d5afd8bb537b109ec2667a7d259e11d02c6e3", 0x4b}], 0x8, &(0x7f0000001e80)=[{0x50, 0x13f, 0x6, "9f78697a864aa7bbb5c857f2bd052ec195beaf1780ccc8657cafb535b6c0de78983aaf3be1d5d095847d16bf7183b580e705ed1689b1bcaea7d914efac"}, {0x48, 0x11f, 0x7, "4e59b3cbafb92fa7f1a87e36a95b00f013a5ab6cfe28e0e996b1cb0b5b0b461203aab190c5232a6fa1e30c15a8aa93790c3aa5ef6cdd61"}, {0x18, 0x10e, 0x5, "a1cceb301400"}, {0x68, 0x117, 0x5, "e7c64771c1301d095ac3cd68fcb99ccb25f2150e02ca1b48a6659db739fb057235b4e2464b992bc214f562fcfff0beea9b640820bfcf8107fe7842c50c266dc625c4d8f19958267868cae3d5ef2a405a2a"}, {0xe0, 0x11f, 0x7df7, "70e345f7f2ff817bba23a09c6516ed1a6dd1c70a3362d57a7043765e59e4c5edfa0d463c3e8cb8c2773fd1afbbf064c35c4dfb0d93f79ef1dab2722de4d1f429a776ee7180c916b65f850b665be794ba620c450c9a69b90f2e03b967113e82079d0ed576ed16da53b3c450a99d068acd7ce601b3b70be5d232b302b13d164fae145d427b62d3a81f3eb1dacddc0898217c304d2a595fa635756af6911bf76daf479fd19b17e148e3b22747bcb82ceb92bca0477a9db6a2ece598ff0784cb47286f63b2dc1ae37f8a0e0b24119361"}, {0x60, 0x10b, 0x1ff, "2ee2a954b86b8123c42acf427b34b89d19100900bf3dcc20ded0076f6c293bae80ffc553259aba2b9f54109178d40869d49756a08a6fc4df662a9929c2d9f476cde5ef5dc8393db2c04ba0fbc421988f"}, {0xc0, 0x0, 0x0, "01b59a396c06d892660f0ab87b1afa0e57e733fb9e714bbbcf74f4c7483cf9c671be383b265d92426ca62c99870c23dc9390b4561f826620c0bf95d2d340b7b48ea23e53938a09e87b1087169ec57cb7c7d6834d9062e9f2258667befd559b2be6f338117a82332d5ebd104178f67938e2a16029cade84cf1ec141d52615a1f01d074572e238f758d3b4bae00cd5286e6c52d6a8fdb5f08f4a90cda8f6b6c9536fc885c477f89748b113"}], 0x318, 0x20000000}, 0x4}, {{&(0x7f0000002300)=@ll={0x11, 0xf5, r1, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000003600)=[{&(0x7f0000002380)="f0b602d204f2c8ca74d97a9e88799dec249b86f35c8c9529b298de1132ed101d98ba44b1398e6607eb8e5eb5a0188a8eb873835074e48a8a64ad60025f90897412c424cb8be938aa30da8e98d9f915d996b81f3fbe", 0x55}, {&(0x7f0000002400)="b7e18033dfd2bc1ab3f4ddebe7c6f389d18fc5dc7f1aa45bbfce4efef1cd2ef6150ac9da983600ecdafb1377c55bce223f6a155b1f09585be7a4cc8a9d67bd4ec8da083e93b9a5a4fcdb03be457d0b1a38f8e13d362fffc3ddc32476660b1e1fc695fd480171ba45ae88bb2921245ebc7b3069f24187a61c560a140cced29b2ee3b5aa72168e1b16923f662093302cbcfc1dda47ae350a2b033a0446018b22bcbb323d514198836653acfc1df6405413590b5e07daf7e11a7e5f1ab5ae1ed5475482e59eaf1bdb69e07e5a617a7519ffd803c6c1ba86a67b9ebb7e6f807b099bc089a86ebfa0d7c75bd9525358e351b4c5122e60c7b2b5242f3d6379dc1d620cb399ae25ee7a84849d751f4ad8e72697ad2daf66223c9af65765b5288ce38a1521616b0575747af165a7784fb38b069bfced9d2feaa2ee7c07d50a6a5ff9566d948b26e4d013d1a097e16a3d48d5a3e3ab5b1c74e4bf522cb11fb8964ffad32a9c9e19a2fdcb01d3049478b219a55eb1a9cf7d78588988580a2a408300a571ef1f64228f79a845a372f136fb0007e416b016e2082f26d0940c0b7749c2f359f79a80ecf808ef0b3041a42b224e46fe04f4b28b1005fb79903b7c1a6870cce851c9499ba997a89fd7d148b28a7d34e34d3feccb97b22d8c9ea0b4e7312e8f3cc16f2920e0d478da99e11321f3b0f45389b0c90e88c63a62c7233155f4f1c850777acde6a1769a08a5da3110686ba4e7d6e62d37379f8b66a81f24687cd76e11d8308c3ee154335933b09c16eeb6f2ea76a480160b1dff023364e8f7ed343e156b495deffdc0731701402ba1965497a386472223ffdee5ed6759b72029a1068e5bc52c8efb46a1d906218e0b9f5c4383a4b9627b98bca227c0a252936980489b74bc73aa15ae597562541da205decfc8b15934c04298d1032d483e7cd462bd55adf0b95576c1d5cbcc6f0fcabdc6cd0d91ef7bbe232808b3e8f3651b922e6c66c59af2fa8d82bf412718f7a63c8ccf896381323cdc303ec4f5e2e554815c1862c602e95ee125cd431fdd06d57a615b4b38de4970cf16dea4ded4e65a237fd3b00ebcee1a4f2149a0b6731f4f4b3446dba982d9d4c19857b58605f5e7be8741eb3c59cbcce7537bf547277a86e3f1f16de9dbf64df967faaef8ef2f0b976ac08eaaff4ceed5acf4c75e0db63b4fd185f2db7d77beb7af7597463ea4a47db3b6a3571ff647127a626a8adc7902f810c79e3c887492b138e197316bd7b79782e758a5062567f00c37938c681aa246f586e3986159a395b89dd67c375e8802ff353c5c3c8019905669719b0eb27bc4a906a101080d2d3a3514027cec27a61ab79af7aa30081ebcef2adcb77d6c1834378d1d1095176a53160a184c52587ba7e2febea8c8a4c2b58476e236e719e05588412f13dde5f28d08f6614f2b554f976eba53e6b9cb4279bf220fe582ff09a86a7dd7a5c147ff204b9ad9dc328e88bf181d98a4f31d826b69372f86cfb77f64f26a8e2b2825637e14e01995fb0eabb4732eb2dc13fcd722724194900c1023bb8bbd493f740ed5b40f0ebbea8f62ab2d1821fd6ca864183451b71b72784e0c10219a8d8a84572de79ee00b8aae45f5d966229fcec8c755e7e4921448cd82c56e8a6d5dfc261c3185f00f6bf8745f08d6840bf22cf651566308d09e16a7d8f4dc99a2bb837e607ff77643d1ca522edb1ccb3861662d970973db0f1a240af7c6025e3b3fb10daba1db5e16eb7e0a11d6987cd301d9833f2d19ad8b6c6d69f55e5976abaf18dc88e65a8687a42a7463ed4312deee1fcc325bb363d3c2d05ff61216657c4c426278ef6b82720b034b9e923814d0437197bcd481e08cc2f2d4d8cb148fa1811ad730f9b2a92e2c116c2339dc7d553091158606894c57fff69cd1890d10be66902684ccee00162068766634a28e3bcc052d8e5ef6feb0c52f0adeade074f3cb7f457c25b08c063e20675f0d93510dd6e755513e8162932732053529e7cad40c7bc516c1bde1938a0377d819302e18185d4914f2dd79b76d78afb0afd95b76e66fa4b50806d9a017ddbb4c56a7933dfadb79c672fa5ae0cdad435427ece36975eadac0494154734186fbc28f49eab6e145d6759bad12f2a25399ac57cb1f606c633326d4e6b78307a4cbf2f75d8eb207ec98f5193dc4f823b2dcf0289649b3dff72df96c91c8654faef70611c9b05c267c4b8034de955e2a896f63d2c9c532e1d8890110ea8bf8d9144b4f7fad134d4949be99e67d298c65132b4c78c11dac680d7707140f7faea72b4cec68f7c763a5205c68fe8c1010fba2687f0f9e1f66e08d4d2cafaa91d88df7bd929ec5fe0c98be9dc7e88ee7bc8d0dd8e6c400fee039fe0cb9d053617b292341b0e99c157db11f789d3833ff762497149a94a4ed77578c6c1fc902ec35a2fddb5adec7fa58e38fd3bce95abef4138f2cc85d784121c77f32a7ae10da656b7cf3392e8e0f83383db130a72ed468bb0e08c1301ab748b3076207fa8bbc7dea17b3a182dcd7118d62b48a8addb6559aaf7dbfce91004a35864c18ec8f8095c275e1b80cf3cfab1a0d8f376c48a1e3895aa6be086f05ef0d3427ec5b92f580dd359a45fc4e9dc70c6518b61bbd76f8654209aaa9f658c36625d2a5f46d05cdb6da7718908ba00ccc3440d3bb77e3417f07215e02ce7314a607984bd380ff1c134640fab7246f63d8774922ad8f3653cb61d088a72e677f2670ef967a92bd14cef93111c242552e724f8513421cab6172c5f4cabdfa5b7c0ed7a4458b39491fde9afe483c23dfb97d851bca16c8b3b164addc893b52bbc6d8290bf96c7660fc157bef395caf8518081dd0712810a4029870b11c21f9621bfffd5473ed89c25f6b33e722f15e33cfa5fd1b54e4744329f699c7637bde53be813117bd90637ecd3356fcd36762cefa25af4dbe12476f4e4306ca09a5f05d4495f4cdd979c1bce269851c3508f225e634e4a9c39a6e8498d376e1f1111caf092b408ced9cd2417e9c3135010837a860afff1aebe2b965288093ca9fafda3e7f04fa2dac6483dd33f0770d3228b22a9a90f287cc2a69df29a582aa13c47d57513b6179590d39880f6816b15036ba7bb0c9e40ad514a41e2228f946aad3e0efbd3ce9569a23c1ca528cbeb15dc1855e009c6a3fa2d19c4944c2471a0de75c89bf47cbb1cb74a7a140a9223f7a4f395e548575f1f4885432ee0aed62b43a5a8fbf1715d6a0c48a8ccd25d9209bb83776133a789a8ca6edffe6f67fce7cc6dfd68b5c111ce557d1a9e627d2f4a62b7637364d55ed01174e58915d5f1e594ba883967a5757fbcfedaddbcb373ff997b4749582462575074d2a77f072464d4fbf3ad9ed96eba34f56ec6faf871864cee82e3c6ce0ca16ca5328db2e19f003920881dde7fb18077a634f289e624bd7937e85598d93319af50567678e963516a12da238ceb8dfe35f1fe9bc5e3fc8a762614563b6531894178331ed5272c05a468f7ee2d59b8afe431a71d4fc9f11d63573ecbcf17cbd12110603495aae1db42b3599050734b61322d0b85c8b0241d23157c0613791ed5f5aabfb6ca279abe7a8b6b884c4740c6b86456800e73cff24f78f88020e9c2919bd6febff931aa4de9613b384ebdebe26c5ef0cde81f4c80b9fa598541078dc32ae0a820e93035b2ff8e63c0f60594e5a78784b6d0c4c997a08d1c18cb34ac87f0b73f0454b7d5361f2facf7493d6ba13fecaac96abd89438ab838fe0d609ebd0179380e20877ea934321a6af6d849d5b7a49205b322aec58656103a78d34ba2b4feab2932e696bf1c7f1c21a4e5a6dab5cb1e7d0ecaacb3e09c714d71d777b7951e4b7bd324031d9c3116b70a34241b5665801cd1f8874c992eef02de2f0866db8a843f267c73fc0b074f3f1b71f292196ef39f3c067e1456756d02af78e01e07c02fa5dde3616065088a8fbc3b0eafa98e2bb648354cae1a224668269cf4a2110a46791f92de6d205e64cc5ec65364cdb87c278bd45776664f41350ef2b808fc30f34ce259c02af682965e01fc14350da4f4b2b30d37daa69573bc185514dd6aeab66565a6e01d3d59890d8a18aea8d0a9841161f6c190c98680e0aed2d626000feb0a21579545a17820eecf2f2ef43a1c179a7b5fc1d15097a58f4055b86b5aad2db7dbb50843801e9f77dfee42f8a18fcc57dca6e6202a63c86446173d074f88629d84333f81bfe43a0016d081bcad03d5366444ba4ffc2f14dd8516e580c088e342fe6108c06d114ccd729faf801d007d1e154b39ed33e36cd8084e9ba1f27fd56c789f67e8373098f9fe2d672600066be599da6dd786896ec5e4fdc45027ec9d00ed744ae117120073c1df4cd8d3b817964310b031c46f2a33e41a9774852ded11c27dbfaa29bfdfa1b85a53fa3607c6bc0d1676f3406288a9c710d219efbd6bceea5dcbb266122dc003692bdd31b17ac4d925993f8625e9a9f75caa3a7fcf697d530c34baf204bedf9e9ab5428500cdd3297de84f400b0d61e65ce249d4e24d00dab102c16fc458ab84d53b5fe2df63fe7ca54cb8c0ac275aac8c7643bfe094210fa1ecf54fd75b0191a1b87ce3fa41cd4b1d86ba39f8e24760b59d9335e51205cde2fdee72069a1bb5cefcad25529ea665ad368f167d5bb5a0be42547eb829a004abfa466c401511bdbf29416d00fce43725535874b88e0ac165d50c345b723f19ace80a089d30790a09092ac5a7f96ef964b0d41ff614ee92da36185367f74e02b71ccb4903ae35a5e6acb0e388cd19284092061f96c28f1a98686bba55bda4af6e76ebfbcae234e4d5c08b980b73a3f4270bd5d4bc8a446cf81b3cd7883a9a67a792c99dfaf238704ac167f2fbe6f551ba729afa4339cdc256a3b173785db03ce998dec1d6690f6e0a91fffec995000e129bb956d370710099a2964a9944c9a56cb27a0259b9b1735b3546ed33f1f617c142a67bd0c809d477d7c87cdef47324e05338326ad7a1769fa9c7bf5d7f8d559fb44e762785da617e2a474a430a7a5b7de0c69db5f53b93e3a6e3e44b000646eacc24aa24b46b28fab678c9cfae811776a7133cbec894eb532282000981e683c3ece4292d7ac58fff99c9a3a8faf7dff2251df55cc3877e325a5328d0861c894ca440bea5ebb68431889f20b8f535b89028d946a880b0ac81ce7862264b577f1d35fd655a90d732b925e868250c51184f1812f7d5304c13a9d0fef4ff1e8dab17e95738b83ed64307cf5695d01db9630154ac5ad9e4f2182640d9c93a345ac6a3dce9414a803020401471ad5a888f6dc9c4f1db74a383da2c66e457c55e2dff3eac48afec03a10e1d95b51656b154f24c7c34ab3aa0569499ca5cc94aa22df10d3f93333fdcbe0e58e97eaa0c5e5a3e68512412cec31aafacce1d26ae41871f9826b162b500a1b81a3766c4786c1fb833e01c0c0536561ce167aa631b8ce99e9e30e10c1ef6395a78e65867121f5fc971a26eeab34930847c9ccf1c425f609516714b9b41026445c096d90b52808ab883830090c3c7a975ad82e5a02d9d2c5b0bf89d81c4b34226718df2c3d46554f467174e9aa5d39ae03bd3eb90619405b5c91328090cb3c31659c23456ec3d2134b7d3326ae6edd4bcffb8a2df52f945fa051764331d590f8a80820b3f76eed3c93d9fd8b4338f6505e0dbbc8d10fe8cb669af99be55b9007be5593e6c925fb5d592084a43922473fbdf8588a10d4c030f74d77687e50872ad384b3dd516fadf0799ebf179ac3f3ac89048d8484f0c6c6cca11a807934fd3a4423", 0x1000}, {&(0x7f0000003400)="b77e6f3d212390b1c6673fcfd61249ac67e73e0fada6becc40f1adde4a9e489679ea1d9f1c6634bd3c06cc8f440a5b5e6af64ef8dc01896709dbaaebec3e71226bcaade75ed0ef1908ca657eca47b141b58d76584b83d35552ee0a42c165ca55eaeb4a3021f2", 0x66}, {&(0x7f0000003480)="99e9549038e0c55cae918e14b407c056b539a7a0587949b5973f7eae70874dc94320570aceb04dcf8c66de90881e8569d7216459ee96bc498a1d612de5e1cb3cdf58158f8e4217ade5de0ff3af533450ab22e3bd943d1897216cbce7ca77eee91ccaa5cd45e3d8b1ffaddbef940f27278678bcb262b58ceb6af04641122407cd71098ee1204780971c182e4732d4bf9dc5f8add01f622d0ce6a2621cbed2cab1719f01b269ad", 0xa6}, {&(0x7f0000003540)="725902ac2250ecd749182a2777b5c1b60b06d3f85969d1a93a49841732f2b859fbf099509931891cec5a272eaa20430eddd30a1d2e7699b3d576ccbea8553addc4305274fc4023244b09f4378f3702b110b55a0b4427bab4bd20bd6796832483d52d3e32b444273c4178ba17a901ba5846acb403603c535ffd0274921c9e3fbfe8a792682597740d9f29c49a83d8557b149f0e99955a00", 0x97}], 0x5, &(0x7f0000003680)=[{0x18, 0x0, 0x10000, ',\x00'}], 0x18, 0x8000}, 0x81}], 0x4, 0x10) [ 168.150312] SELinux: policydb magic number 0x5edbff8c does not match expected magic number 0xf97cff8c 10:24:28 executing program 1: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:28 executing program 2: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) [ 168.299874] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 168.325334] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 168.384502] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 168.398329] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 168.941773] SELinux: policydb magic number 0x5edbff8c does not match expected magic number 0xf97cff8c 10:24:30 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000140)={0xf97cff8c, 0x5, '\nE Linux'}, 0x10) 10:24:30 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r2, 0x5420, 0x0) 10:24:30 executing program 2: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:30 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) syslog(0x9, 0x0, 0x0) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000140)={@loopback, @multicast1, r1}, 0xc) 10:24:30 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0x4) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfc, 0x6801000}, 0xc) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'user.', '\x00'}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:30 executing program 1: r0 = getpid() ptrace$getenv(0x4201, r0, 0x80, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = getpgrp(r1) r3 = gettid() r4 = syz_open_procfs(r2, &(0x7f0000000040)='net/rt_cache\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) ioctl$UI_DEV_DESTROY(r4, 0x5502) rt_tgsigqueueinfo(r2, r3, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x6}) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f00000000c0), 0x8) read(r5, &(0x7f0000481000)=""/128, 0x80) 10:24:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KDENABIO(r1, 0x4b36) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000080)={0x30002005}) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x480, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 170.229717] sel_write_load: 6 callbacks suppressed [ 170.229722] SELinux: failed to load policy [ 170.247102] SELinux: policydb string length 5 does not match expected length 8 [ 170.262896] SELinux: failed to load policy 10:24:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r0], 0x4) 10:24:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000c40)=ANY=[@ANYBLOB="140000f910000107000000000000000103000000"], 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002f80), 0x269, 0x2, &(0x7f00000030c0)={0x0, r2+10000000}) 10:24:30 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r1, 0x400000000000003a, 0x1, &(0x7f0000000240)=""/188, &(0x7f0000000300)=0xbc) [ 170.275930] SELinux: policydb string length 5 does not match expected length 8 [ 170.284181] SELinux: failed to load policy 10:24:30 executing program 1: geteuid() fstat(0xffffffffffffffff, &(0x7f0000000780)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000001c0)={0x9, 0xd9a6, 0xff, 0x6, 0x5768, 0x2}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x100) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x1c, 0x30, 0xb, 0xb, 0x4, 0x7, 0x6, 0x44, 0xffffffffffffffff}}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000600)=""/131, 0x83, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r0, 0x10, &(0x7f00000006c0)={&(0x7f0000001800)=""/4096, 0x1000, r3}}, 0x10) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f00000005c0)={0x5}) r4 = dup2(0xffffffffffffffff, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x15, 0x1c, "b13b0bc1fc8d063aed08afa3af37e244ef964c15bcd5d2ab192a88a74353d445223a9ecbb3eef822289d4e1dbbf8d8f13123c7eefcecf4a59521d1fde1315ee7", "2437bffc617f96b6b3209d14ed092bff817e064880650be0bb894cc4c772baeb", [0x7, 0xa4]}) socket$inet6_tcp(0xa, 0x1, 0x0) close(r4) truncate(&(0x7f0000000080)='./file0\x00', 0xb9) r5 = request_key(&(0x7f0000000300)='ceph\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)='rootcontext', 0xfffffffffffffffa) keyctl$get_security(0x11, r5, &(0x7f0000000440)=""/16, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x10) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000480)="60458ffd9cd0cd4f20e6de3b689a1e") mount$bpf(0x0, &(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='bpf\x00', 0x0, &(0x7f00000017c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'user_u'}}]}) 10:24:30 executing program 4: r0 = getpgid(0xffffffffffffffff) sched_getparam(r0, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4d, 0x0, &(0x7f00000002c0)) [ 170.388166] SELinux: failed to load policy [ 170.457616] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 170.492610] SELinux: security_context_str_to_sid(user_u) failed for (dev bpf, type bpf) errno=-22 10:24:30 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:30 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f00000005c0)=0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1) pwritev(r0, &(0x7f0000000280), 0x300, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000280)="118d53d9967cdea026abbab87aa504a117e385c26c82f3f6d2b7ea87ab5ce166848a01fdae92f21f6beb7a6d8553f417ae73e1692c1526774637d6cc3b2234ead774c59916aba703b929a0f2abbf88e6cfe521e31eec") setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0)=0x8c8, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={@mcast1}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x7) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000001400), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x0, 0x20000003, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f00000003c0)) r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0xb1c0000000000000, 0x80001) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x3, 0x49a5fd81, 0x0, 0x7fff}, 0x1c) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x44) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f00006c9000/0x2000)=nil, 0x2000, 0x1e, 0x8032, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) socket$nl_generic(0x10, 0x3, 0x10) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getegid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='wlan0+\x00', 0xffffffffffffff9c}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)={&(0x7f00000007c0)='./bus\x00', 0x0, 0x10}, 0x10) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/context\x00', 0x2, 0x0) 10:24:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0xffffffffffffff8e, 'SE Linux', "12000000004c000006000000c6c192ed3b94a00c00060000"}, 0xe9) 10:24:30 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsync(r0) bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x9, 0x1d, 0x6, 0xc, 0x2}, 0x2c) prctl$PR_MCE_KILL_GET(0x22) [ 170.509792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 170.521241] SELinux: security_context_str_to_sid(user_u) failed for (dev bpf, type bpf) errno=-22 10:24:30 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000080), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 10:24:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x5, 0x5, 0x7, 0x9, 0x40000000000000}, 0xfffffffffffffdfd) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) openat(r0, &(0x7f00000001c0)='./bus\x00', 0x0, 0x8) creat(&(0x7f0000000080)='./bus\x00', 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x4, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000180)) socketpair$unix(0x1, 0x100040000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet(0x10, 0x2, 0x30) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r4, 0x40046208, 0x0) sendmsg(r2, 0x0, 0x8041) memfd_create(&(0x7f00000001c0)='\x00', 0x0) r5 = syz_open_dev$loop(0x0, 0x0, 0x2) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000080)={0x3, 0x3, 0x0, 0x0}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='syz_tun\x00', 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair(0xb, 0x0, 0xe6b000000000, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r7, 0x80) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 10:24:30 executing program 0: write$selinux_load(0xffffffffffffffff, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:30 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000180)="9416be0025d21e538de91271a2a74c8bff7f1d4c46a44eb96ae5f4b1cd666a936060863d77a390733f5731f513dc906ed0aea288b320ff4d748e6429e4734b7ccfaaf20c8902c8e2b6a16cda900506248d2cd0") setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200)=0x1a, 0x4) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x1, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) fcntl$setflags(r1, 0x2, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) keyctl$link(0x8, r5, r4) [ 170.550008] SELinux: policydb string length -114 does not match expected length 8 [ 170.567173] SELinux: failed to load policy [ 170.573525] SELinux: policydb string length -114 does not match expected length 8 [ 170.582264] SELinux: failed to load policy 10:24:31 executing program 5: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xb) munlock(&(0x7f0000bdd000/0x2000)=nil, 0x2000) 10:24:31 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400000, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:31 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000180)="9416be0025d21e538de91271a2a74c8bff7f1d4c46a44eb96ae5f4b1cd666a936060863d77a390733f5731f513dc906ed0aea288b320ff4d748e6429e4734b7ccfaaf20c8902c8e2b6a16cda900506248d2cd0") setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000200)=0x1a, 0x4) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x1, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) fcntl$setflags(r1, 0x2, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) keyctl$link(0x8, r5, r4) 10:24:31 executing program 4: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(r1, 0x10, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000380)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff8000/0x6000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)="bcfa139792cd2f75abcdf53ceed1f697649a564c8419be5aeae199b2bbf03f61012636396d2a3d81249e7462ff7023b7c7887b7f9643fb0c8e249d1c29ac49f4ceb526a8fe8ade197168ecd151607200e0c6bb6f7920f5a41ab139382f585109888c91905083fcd00ca7b98f9cd59fc4d63022b3eec2257393708a5aaa309b05d79f72ec254906e1af482817adef884f7c47f29b8cc16f76e39d84554bdc3ebd9fe93593a4e585bf8714c1728c0f20ab9274fb48db5df82a7812b2ba2c1ea2c2087b6c7d3237e15898d6343c0366b83e5db3fd741e7a6a573370b7dbe68971b5e4184411d6", 0xe5, r2}, 0x68) sendto$inet6(r2, &(0x7f0000000300), 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e25, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000340)=@get={0x1, &(0x7f0000000280)=""/148}) ftruncate(r2, 0x4) r3 = dup3(r1, r2, 0x0) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000040)) [ 171.207033] SELinux: failed to load policy 10:24:31 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f00000000c0), 0x4) getsockopt$inet6_int(r1, 0x29, 0x5b, &(0x7f0000000000), &(0x7f0000000040)=0x4) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) 10:24:31 executing program 5: getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000100)=0x78) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000080)=@known='trusted.syz\x00', &(0x7f0000000300)='{{\'mime_type\\}ppp1\x00', 0x13, 0x0) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000340)=@nat={'nat\x00', 0x1b, 0x5, 0x630, 0x3f8, 0x1b0, 0x2b8, 0x2b8, 0x2b8, 0x560, 0x560, 0x560, 0x560, 0x560, 0x5, &(0x7f0000000200), {[{{@ipv6={@remote, @remote, [0x0, 0x0, 0xff, 0xffffff00], [0xffffffff, 0xffffffff, 0xff, 0xff], 'ip6gretap0\x00', 'bcsf0\x00', {0xff}, {}, 0x1d, 0x3, 0x2, 0x1}, 0x0, 0x180, 0x1b0, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x0, 0x3, 0x6}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x7e, 0xf36, 0x7, 0x400, 0x9, @ipv4={[], [], @multicast1}, @mcast1, @dev={0xfe, 0x80, [], 0x19}, [0xffffffff, 0x0, 0xff000000, 0xffffff00], [0x0, 0xffffffff, 0x0, 0xff000000], [0xffffff00, 0xffffffff, 0xff000000, 0xffffffff], 0x0, 0x48}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0xffffffffffffffc1, 0x1ff, 0x8}, {0x63c8, 0x8, 0xffffffff}, 0x8, 0xe24}}}, {{@ipv6={@mcast1, @local, [0xff000000, 0xffffffff, 0x0, 0xff], [0xffffffff, 0xffffffff, 0x0, 0xffffffff], 'bond0\x00', 'teql0\x00', {0xff}, {}, 0x0, 0x1, 0x4, 0x40}, 0x0, 0xc8, 0x108}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x1, 0x10, "60a1e5ec0cd93feddb4fed8e93207d1d468f44aff2d0273ea84baf63c35c"}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x1c}, @mcast1, [0x0, 0xff, 0xff000000, 0xffffff00], [0xffffff00, 0xffffff00, 0xff000000], 'bond_slave_0\x00', 'bpq0\x00', {}, {}, 0x7f, 0x6, 0x1, 0x10}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x100000001, 0x9, 0x401, 0x2, 0x3}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x10, @ipv4=@remote, @ipv4=@local, @port=0x4e20, @icmp_id=0x64}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0xa}, @dev={0xfe, 0x80, [], 0x16}, [0xffffff00, 0xffffff00, 0xffffffff, 0xff000000], [0x0, 0xff000000, 0xffffffff], 'irlan0\x00', 'nr0\x00', {0xff}, {0xff}, 0xc, 0x7, 0x0, 0x50}, 0x0, 0x120, 0x168, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x8, 0x1, 0x5}}, @common=@frag={0x30, 'frag\x00', 0x0, {0x4, 0x100000001, 0x74a, 0x11}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x4, @ipv6=@local, @ipv6, @icmp_id=0x67, @icmp_id=0x67}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x690) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a0009000300021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:24:31 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f00000007c0)=0xc) sched_setaffinity(r0, 0xfffffffffffffe30, &(0x7f0000000740)=0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x200001, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r4, 0x89f0, &(0x7f0000000400)={"69705f767469301000", @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r4, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) connect(r3, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @broadcast}, 0x4, 0x3, 0x1, 0x3}}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x40001) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000380)=0xfff, 0xfffffffffffffdd1) sendto$inet(r5, &(0x7f0000000000), 0x0, 0x20000802, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0xc) flistxattr(r5, &(0x7f0000000580)=""/192, 0xc0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f00000004c0)={0x8, 0x4000000000000}) getsockname$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0xffffffffffffffd7) sendto$inet(r5, &(0x7f0000d7cfcb), 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000240)={{0x3, 0x0, 0x5, 0x3, 0x1f}, 0xc26, 0x9, 0x4}) shutdown(r5, 0x400000000000001) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000500)={{0x3, 0x3, 0x332, 0x3, 0x81}, 0x4000, 0x3ff, 0xffffffffffffff80}) r6 = gettid() capset(&(0x7f0000000340)={0x20080522, r6}, &(0x7f0000000480)={0x7, 0x4, 0x5, 0xa3e5, 0x9, 0x7fff}) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e24, @local}}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'broute\x00'}, &(0x7f00000003c0)=0x78) ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000700)) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f00000001c0)={0x2, 0x400, @remote}, 0xffffffffffffff06) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:24:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c00000600003c9f0400000600002174e3577e33705a24fcac040000000000"}, 0xfffffffffffffeea) [ 171.229589] SELinux: failed to load policy 10:24:31 executing program 4: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:31 executing program 2: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)={0x0, @speck128, 0x0, "12a42fc77c160f41"}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x400000000001, 0x0) request_key(&(0x7f0000000180)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000300)='\'\'/GPLeth0self\\,\x00', 0xfffffffffffffffa) write(r1, &(0x7f0000000280), 0xba6c1c86) r2 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x544f, &(0x7f00005ebff8)=0x2000002) fcntl$setsig(r3, 0xa, 0x12) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) clock_gettime(0x0, &(0x7f00000002c0)) ppoll(&(0x7f0000000040)=[{r4}], 0x1, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) fcntl$setownex(r3, 0xf, &(0x7f0000704000)={0x0, r2}) dup2(r3, r4) tkill(r2, 0x15) [ 171.371322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 10:24:31 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x8080, 0x0) r1 = accept(r0, 0x0, &(0x7f00000000c0)) fcntl$setsig(r1, 0xa, 0x4) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) times(&(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000180)=0xc) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) lchown(&(0x7f0000000040)='./file0\x00', r3, r4) write$selinux_load(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8cffcaf90800e5ff5345204c691075780098f0c98c02ea9a3fc110612e0000000000000001"], 0x28) write$evdev(r1, &(0x7f0000000100)=[{{0x0, 0x2710}, 0x14, 0x80000000, 0x3ff}, {{}, 0x14, 0x2dd, 0x59d}, {{0x0, 0x2710}, 0x17, 0x9, 0x80}], 0x48) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000000)) [ 171.416497] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 10:24:31 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:31 executing program 1: mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) bpf$MAP_CREATE(0x0, 0x0, 0xa6) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:31 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x30}, 0x45c) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x2f) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) fallocate(r1, 0x0, 0xff, 0x4) [ 171.501568] SELinux: policydb magic number 0xf9caff8c does not match expected magic number 0xf97cff8c [ 171.531036] input: syz1 as /devices/virtual/input/input13 [ 171.543918] SELinux: failed to load policy 10:24:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) getdents(r0, &(0x7f0000000000)=""/46, 0x2e) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812000000004c0000f09bc8dbd63d4489802ad8d56bca060000000700baa2341c40f7b195231ea748eb1b60ccc9f23afe5f5ea38c1685c5c1bb8936fbc803c335e8f5eb7c68f01d7e7387abca7f6b58359c97d82b7238a88de127ced23c5956263d00e20480ae109b949f01"], 0x28) 10:24:31 executing program 4: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) [ 171.549648] input: syz1 as /devices/virtual/input/input14 [ 171.569407] SELinux: policydb magic number 0xf9caff8c does not match expected magic number 0xf97cff8c [ 171.586102] SELinux: failed to load policy 10:24:32 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f2) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) sendfile(r1, r1, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="6956754696e9b4f1cfbed153b3b38b2a70fc6db89aae8b51eeee9caf04326fe4bdb6fa69f954675438d31907f3e9954c1066dedb02600615579141073986", 0x3e}], 0x1, 0xb) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f0000000340), 0x8) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000140)={0x6, @dev={0xac, 0x14, 0x14, 0x1f}, 0x4e22, 0x2, 'fo\x00', 0xa, 0x401, 0x7a}, 0x2c) 10:24:32 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:32 executing program 0: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) [ 171.754253] SELinux: policydb table sizes (-607609872,-1992016426) do not match mine (6,7) [ 171.793897] SELinux: policydb table sizes (-607609872,-1992016426) do not match mine (6,7) 10:24:32 executing program 4: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:32 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:34 executing program 2: r0 = socket$packet(0x11, 0x40000000000a, 0x300) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fstat(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r2, r3) sendto$inet6(r0, &(0x7f0000e77fff), 0xffffff77, 0x20000008, 0x0, 0x9) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000040)) 10:24:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7812000000004c000006000000070000003c9f00000006000000000000100000000000000000"], 0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xe, &(0x7f0000000000)='/selinux/load\x00', 0xffffffffffffffff}, 0x30) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x7fff, 0x9, 0xfff, 0x7, 0x0, 0xffffffffffffff13, 0x44000, 0xf71bb5ef2c3bd70e, 0x81, 0x17aa, 0x9, 0x100000000, 0x9, 0xc000000000000000, 0x8000, 0x6, 0x1, 0xffff, 0x2, 0x9, 0x1, 0x8001, 0x4, 0x5, 0x8000, 0x9, 0xca, 0x96, 0x3ff, 0x9, 0x7f, 0x5, 0x40, 0x7, 0x100, 0x7f, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0x4}, 0x10040, 0x1, 0x0, 0x5, 0xffffffff, 0x4, 0x1}, r1, 0xd, r2, 0x1) 10:24:34 executing program 4: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:34 executing program 1: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:34 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x7530}, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000140)={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}, {0x306, @remote}, 0x12, {0x2, 0x4e23, @multicast2}, 'dummy0\x00'}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1) r3 = socket$packet(0x11, 0x3, 0x300) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$packet_int(r3, 0x107, 0x800000000007, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 10:24:34 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:34 executing program 4: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x82081, 0x0) [ 174.431365] SELinux: policydb magic number 0x1278ff8c does not match expected magic number 0xf97cff8c [ 174.446737] SELinux: policydb magic number 0x1278ff8c does not match expected magic number 0xf97cff8c 10:24:34 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readv(r0, &(0x7f0000001480)=[{&(0x7f0000000000)=""/29, 0x1d}, {&(0x7f0000000100)=""/198, 0xc6}, {&(0x7f0000000200)=""/207, 0xcf}, {&(0x7f0000000300)=""/132, 0x84}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x5) getpgrp(0xffffffffffffffff) getuid() getresgid(&(0x7f0000002ac0), &(0x7f0000002b00), 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000003c0)) fcntl$getownex(r0, 0x10, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000002dc0)) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000001500)={0x4, 0x38, 0x17, 0xd, 0x5, 0x0, 0x0, 0xb7, 0xffffffffffffffff}) getresgid(&(0x7f0000002e00), 0x0, &(0x7f0000002e80)) getpid() stat(&(0x7f0000002ec0)='./file0\x00', 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000035c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) lstat(&(0x7f0000003000)='./file0\x00', 0x0) getgroups(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) fstat(r1, &(0x7f0000003140)) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000440)) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003240), 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) 10:24:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141040, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:35 executing program 1: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:35 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x5, @empty, 0x8}, 0x155) flock(r0, 0xd) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x4}]}, &(0x7f0000f6bffb)='GPL\x00', 0xffffffffffffffff, 0x14e, &(0x7f00001a7f05)=""/251}, 0x48) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001cc0)={0x0, @rand_addr, @local}, &(0x7f0000001d00)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001d40)={0x9, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="6575ffff776dae960000950000000000a6e1000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0xe2, &(0x7f0000001b40)=""/226, 0x41000, 0x0, [], r1, 0xf}, 0x48) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x98) sendmsg(r2, &(0x7f00000017c0)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x3c92, @empty, 0x59}, 0x80, &(0x7f0000001340)=[{&(0x7f00000000c0)="e4bdb11697c8f03c17c0b7b065ca3dbe7835a833b8bf82300b1bcd78cdc8b504626bb775db4bc008a7949e1d15fc5ed49bcd52c7987136a6a6aa6f3818c95d1145726dd39d975ad64c598970f1b5432fe967e7ea9e2ebcfa9feb9b1e489306855d6626e98f0109c6a2d48f4971", 0x6d}, {&(0x7f0000001800)="d1f641892bf300870f7b173fe8ec4cfe45cec9481b84e28c788c1391f9cf1b38274307f8ea60990bf03b130ebb291ab4bc3bb21826538e7e475f3720b25c1c7f0fb1fd8747d0ddc033224df36729d107bdf430987b5669c715c80205a4a8f5827cf49742412dab88d6598e5e2204e6bd27ec4cc0543eded5d60cfb8ab2557f37f130a20fbb314081aa7225c40c213645167e6e897ca3bd9ffa4aef071c411c569d6f8985f814f0fbf776e727f04cf1b3a19e961c37cc9fb8fe3e1cd71691b5405b0cab3552bc91c1622caba65fb1c1598b", 0xd1}, {&(0x7f0000000240)="4c0a1d2b50e4ea31dcb9307e7dad791512ad0e5dd4a8f6a441b4dae3c15f1f819ab0e74ade0547c12c006a71beb5f52b0549ee347fca38be42dc2f4bc213513b1d41256ba0169fcdc069c3eebe76e2ad82f383c7878455e462dd3db3751fd5acb21c1dce04a1aa160f3b61f4afd43502c34dc3d71cb76c02b0dcad44539f30df9fd9004ebfe6ceabdc4f7a95eb694c794ff3afb5dbb29e9cc57d5d6bcb5d1b13", 0xa0}, {&(0x7f0000000300)}, {&(0x7f0000000340)="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", 0x1000}], 0x5, &(0x7f00000013c0)=[{0x90, 0x0, 0x1000, "68dd0d6b03b4cd57128591e195fb350eed1fe690c83df96944200ca23bdf471ae004119adc02d7b3a8bbdc58f76376179cd780848f83dc223de0c565e9342dfaaa8113fa2e614fc0ac25a46b764c92c9b95fa8f55c963ad71d4254fe744c9553e99f8119c1cc3eda067fa7aee8410b5cdf372f98a667ccc0754a8c"}, {0x30, 0x1, 0x7fffffff, "636770dd05ac6e080816d433aafdf5fcc7d16daa44b840fee17b91f9"}, {0xd0, 0x1ff, 0x53, "645514598fed055e3e8a8f404da2404f1bbb308931f484ea2ed908026fcde8747b8fbf44498fdffe75d8249e675ba16fc426caf7830e1ce581906fbbf95e1efa66e2ed0a5078126ac9ac7099661f190974163a4e6a389e5121f4f5b6c6e85aef0d32a4c71be208a8c03944ffe80bb389e46b9b559d5f16e1e0949617ea9b5eaf9337bf9a692b38d4b70463d4730d4656e82a0660962c6c2abe58cadadecaab57d596f0df59a62a721f50f72c9fb45c283a084e7750aa012ce2148e0d9a37"}, {0xd8, 0x13b, 0x0, "a10d8ef9566ba051d9c875743cf1d16d6fcea27413d926d6983ff175367c0bff4a8db0a69d49f674097a5e4f522e4d66706f6108d6f072af8b6b3a68b296a21fe9218290ac2e80fa2430d365755359248c8caf55196138c650955e62eb82a1b6b9ebf9ae8e7069587404a94eb21da7b5f21f581068d36045f654b4728508e49458893221e87d2c8b492672b6745f40b656775f078f201b9dc7731d9f8cee041c4f5a63248ad643d465970309159e80a11658f468bbf6a20d95b6f281abeba9ee7e227c1f71cb"}, {0xb0, 0x10b, 0x8, "62779a0892bb83b3848475b3b4e542737b3ac0a7e84acd5f242ca976703b3c25a72e3e16132f7c9a21a34c6f84f2e6e074fdf5921e3413796e743431808c112c28dd3de40f7de6ee7c7316a83ada2626ff671a4fb56f413b7697456495e1acc99ec903ec589bf9df304b27bdb24dc77ae2b9590ee32197bcb08992eae2179bd7ad7bc958b12852964dbb9a7a5f9cd90c52051e4e8a5fdf7d9b2e"}, {0xb8, 0x116, 0x7fff, "ac836d302ae2afee07f31c88308419a643634654a05312ac720787a2e10cd10038a7e1819fa2b55fbcd39eca4597c50248df3bd7ce50a41223771ddd2551c9310cff51d294aae092e8131459c5b5c04f092abbc8d88d39019d906d395d3a1bdb3e6b3108297752467ae4f347d2110128acc5f8c9bfd2e0eb5336646771f086904239da91c9f4c45879e3fc5eeb2e2722c7b96105bcf9eacf9ad4c6740a14df2d7de4a6b1"}], 0x3d0, 0x40084}, 0x8000) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000001900)={0xfffffffffffffff8, {{0xa, 0x4e22, 0x2, @mcast1, 0x6}}, 0x0, 0x3, [{{0xa, 0x4e21, 0x4, @local, 0x3}}, {{0xa, 0x4e24, 0xb9f, @mcast1, 0x53e}}, {{0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x11}, 0x90f9}}]}, 0x210) 10:24:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x10040000000000, &(0x7f0000000680)={0x9, 0x2, 0x3, 0x8c3, 0x12}, 0x2c) 10:24:35 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:35 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x23, &(0x7f00000012c0)='{mime_type(posix_acl_accessGPLem1]\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f00000001c0)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000680), 0xfffffffffffffd3f, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000280)={0x80000000, {{0xa, 0x4e24, 0x9, @loopback, 0x9}}, {{0xa, 0x4e20, 0x2, @empty, 0x4}}}, 0x108) umount2(&(0x7f0000000240)='./file0\x00', 0x0) pipe2(&(0x7f00000015c0)={0xffffffffffffffff}, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000001c00)=""/4096) waitid(0x0, 0x0, &(0x7f0000001540), 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000001bc0)={0x0, 0x0, 0x2}) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40000, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02d9e74ed80b00000000000000000000"], 0x10}}, 0x0) 10:24:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x10040000000000, &(0x7f0000000680)={0x9, 0x2, 0x3, 0x8c3, 0x12}, 0x2c) 10:24:35 executing program 5: write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) socket$nl_route(0x10, 0x3, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffffffffffe27) 10:24:35 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f00000001c0), 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) set_robust_list(&(0x7f0000000500)={&(0x7f0000000440)={&(0x7f0000000300)}, 0x3, &(0x7f00000004c0)={&(0x7f0000000480)}}, 0x18) getegid() r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001600)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0xde4d, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, 0x6512dd2a, 0xfffffffffffffffd, 0x3, 0x10001, 0x7ec5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x60000000, 0x4b95, 0x5e, 0x2, 0x0, 0xfffffffffffff000, 0x6, 0x2, 0x8, 0xffffffffffffff00, 0x6, 0xc1, 0xffffffffffffffeb, 0x4, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0x3f}, 0x20, 0xffffffffffff8c04, 0x8001, 0x2, 0x1, 0x0, 0xd8}, 0x0, 0xf, r2, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) statfs(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)=""/65) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x50010, r2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffd, 0x5}}, 0xe8) connect$inet6(r3, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="640000000000000000000001000000000200000000000000000000000000000000000000180100000000082000000000000000000007000000000000"], 0x3c) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000001580)) sendmmsg(r3, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) r4 = accept(r0, 0x0, &(0x7f0000000180)) sendmsg$key(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x2, 0xe, 0x5, 0x8, 0x8, 0x0, 0x70bd26, 0x25dfdbff, [@sadb_sa={0x2, 0x1, 0x4d6, 0x8001, 0x7, 0x4f, 0x3, 0x20000001}, @sadb_x_sa2={0x2, 0x13, 0x9, 0x0, 0x0, 0x70bd25}, @sadb_ident={0x2, 0xb, 0x17, 0x0, 0x7}]}, 0x40}}, 0x8000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)={0x2, 0xa, 0x67f0, 0x3, 0x7, 0x0, 0x70bd25, 0x0, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e21, @loopback}}]}, 0x38}}, 0xc800) sendmsg$key(r5, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000059d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000001, 0x0, 0x0) 10:24:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000340)="6d656d6f72792e6576656e7473009b85e21c54554362b5dea19f74e6754a82087e3cba83c58e6aaffb1f14db931979b0dd870836b61d68a7dc3a4c959ab6767b528b916b8f8da2f7324536bdc01df09a389602ed770fcfbc70bb784bacb3c34ade5e9cd5edde1eaf8125b45ac2f832c95cc7d6b2093a5326857cc759c815e88226ad1c40e566861a0097a65ea0ed9408f6a5a7c3a5d85b3235c67bbde65406a8effa24405e5568179253e39c6e2a83fd", 0x7a05, 0x1700) getsockname$netlink(r1, &(0x7f0000000140), &(0x7f0000000540)=0xc) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x2) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f2) recvfrom$inet(r0, &(0x7f00000005c0)=""/179, 0xb3, 0x2000, &(0x7f0000000500)={0x2, 0x4e24, @remote}, 0x10) recvfrom$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000480)=[{{&(0x7f00000001c0)=@rc, 0x80, &(0x7f0000001500)=[{&(0x7f00000000c0)=""/55, 0x37}, {&(0x7f0000000240)=""/170, 0xaa}, {&(0x7f0000000300)=""/10, 0xa}, {&(0x7f0000000340)=""/190, 0xbe}], 0x4, 0x0, 0x0, 0x7}, 0x4}], 0x1, 0x12003, &(0x7f0000001580)={0x77359400}) r4 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r4, r4, &(0x7f0000d83ff8)=0x2a00, 0x8000fffffffe) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000000480)}}], 0x6fdcaf, 0x22, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e, 0x1) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000200)=""/202) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000580)) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00a7b6dc90116dc9"], 0x8) write$tun(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="000008060207ffff8100132401040000000000001bb667b4de08080042ff01900068000102f79078ac141411000000074410140300000007e00000020000004e00832309e0000001ac1414aa0000005fac1414aaac1414aa7f0000017f000001ac1414bb831b050000084effffffffac0114aa7f000001ac1414bb000080019406000000048805afff9201890b06e0000002e0000001880bcfff9606e3a79768800000000c009078064600004f010b4600650005062e100000000005e0000001831709ac141411e0000002e0000001e0000001ffffffff072320ac14141dac1414bbe000000200000094e0000002e00000017f0000010000010083130200008000ac1414bbffffffff0000000044300013000000bcac14141b00000001ac1414bb0000001f00000000000000000000000000000004e00000020000008186130000000307063f1501c70607539648913d86370000040006048fb70604eb5e0709e859b3beb53deb07102d972cbbc88f8b7e65f57a4bc0520510c84bc1bee0a2672c3079a6defecd01861300000081000d46e7234c2ded84e01b0736070b04ac1414aaac1414060000b2769f3e"], 0x1ac) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000480)={0x7ff, 0xa, 0x7169, 0x0, "e41abf497610a02f26f045b727424965af022b09b3aa3c4609b8b992a5842377"}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:24:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000200)='./file1\x00', 0x2000, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x1, 0x8) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000001640)) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/sockstat6\x00') mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000002, 0x20010, r2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000002c0)=0x4) clone(0x0, &(0x7f0000000280), &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) ptrace$getsig(0x4202, 0x0, 0x9, &(0x7f00000001c0)) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000140), 0x4) 10:24:35 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c00000600009f000000e4ff00"}, 0x22) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x100) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000100)=""/161, &(0x7f0000000040)=0xa1) [ 175.472390] SELinux: policydb table sizes (-1627389946,-469762048) do not match mine (6,7) [ 175.494221] sel_write_load: 8 callbacks suppressed [ 175.494225] SELinux: failed to load policy 10:24:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9f5bfe2ff5245204c696e757812000000004c000006080000070000003c9f000000060000"], 0x28) [ 175.522992] SELinux: policydb table sizes (-1627389946,-469762048) do not match mine (6,7) [ 175.553660] SELinux: failed to load policy 10:24:36 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001400)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000080)="cc3f2f35ecd282df6a985b83c5d02c5e74a6ab13ae798894995f3c03e16d2e8bcaaeb429359f67c81cc2fd54cbe7d84027d715e51d6ecd4a0f997f1470dde2376b0745d0ffc086f7cb20ab33dd4743ec22102f0eea0658074f6e82249bf17e75d0e7b18de6836567ce46d2a25a7eadcfdff0594cea0097dba3ebb61db88517c37104bf91e6ac03f3b684d3a7d6936330d1a5ef7a80c76e2eaa05ef06ead70ad3913c92f90aa4e895b1184d06a3f31eab971d6db9ee8e1884eda4", 0xba, r0}, 0x68) sendto$inet(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0x2, 0x1000004e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='sit0\x00', 0x10) r1 = memfd_create(&(0x7f0000000140)='dec ', 0x0) ftruncate(r1, 0x40007) sendfile(r0, r1, 0x0, 0x2000000000005) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x82041, 0x0) pwritev(r2, &(0x7f0000000440)=[{&(0x7f00000003c0)='P', 0x1}], 0x1, 0x0) [ 175.699616] SELinux: policydb string length -1916939 does not match expected length 8 [ 175.730702] SELinux: failed to load policy 10:24:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "6611864aad4ff687136f2f310a2424bb8a1eb19a867d337132be3ae4a7d9f0547f7ab01d88643c278e3ecd71e7a92984b1d6f6136dbd08557d296ffd4a6ff93b56d8cc71859872ab4fcad255d912d26d1be9d6e13866a69fdd8b80ce543b67753c0e2b3d488b663635677c616033dd6107129b1ccb188d267963884a9713d59f489c7c745b1057f933d07d23cf74472c4fba00e0331fd7a7bc8abc3d9667cea05ec257ee48e2bf8680242f9a08738e917f8abadf4d9f260b422d4bec9bf4244472c09e7eeeb1f4dedd2b"}, 0xda) flistxattr(r0, &(0x7f0000000080)=""/54, 0x36) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x8000, 0x0) write$P9_RRENAME(r1, &(0x7f0000000040)={0x7, 0x15, 0x2}, 0x7) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x480001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r1, &(0x7f00000000c0)=@sco, &(0x7f0000000140)=0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0xb, 0x800, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000001000)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80028}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000580)=ANY=[]}}, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x37) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000280)={@remote, @empty, 0x0}, &(0x7f00000005c0)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000007c0)={r4, 0x1, 0x6, @dev={[], 0x14}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) set_thread_area(0x0) r5 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x32aa) close(r1) accept4(r2, 0x0, &(0x7f0000000000), 0x0) readv(r2, &(0x7f0000000740)=[{&(0x7f0000000180)=""/250, 0xfa}, {&(0x7f0000000400)=""/145, 0x91}, {&(0x7f00000004c0)=""/250, 0xfa}, {&(0x7f0000000640)=""/232, 0xe8}, {&(0x7f0000001040)=""/4096, 0x1000}], 0x5) recvmmsg(r1, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0xfe64, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/212}], 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x2, 0x0) [ 175.774534] syz-executor4 (6944) used greatest stack depth: 22624 bytes left 10:24:36 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:36 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, &(0x7f00000001c0), 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x800000009) set_robust_list(&(0x7f0000000500)={&(0x7f0000000440)={&(0x7f0000000300)}, 0x3, &(0x7f00000004c0)={&(0x7f0000000480)}}, 0x18) getegid() r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001600)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001240)={0x1, 0x70, 0x0, 0x0, 0x0, 0xde4d, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x0, 0x6512dd2a, 0xfffffffffffffffd, 0x3, 0x10001, 0x7ec5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x60000000, 0x4b95, 0x5e, 0x2, 0x0, 0xfffffffffffff000, 0x6, 0x2, 0x8, 0xffffffffffffff00, 0x6, 0xc1, 0xffffffffffffffeb, 0x4, 0x0, 0x6, 0x4, @perf_config_ext={0x7, 0x3f}, 0x20, 0xffffffffffff8c04, 0x8001, 0x2, 0x1, 0x0, 0xd8}, 0x0, 0xf, r2, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) statfs(&(0x7f00000002c0)='./file0\x00', &(0x7f00000003c0)=""/65) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x50010, r2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffd, 0x5}}, 0xe8) connect$inet6(r3, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="640000000000000000000001000000000200000000000000000000000000000000000000180100000000082000000000000000000007000000000000"], 0x3c) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000001580)) sendmmsg(r3, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) r4 = accept(r0, 0x0, &(0x7f0000000180)) sendmsg$key(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x2, 0xe, 0x5, 0x8, 0x8, 0x0, 0x70bd26, 0x25dfdbff, [@sadb_sa={0x2, 0x1, 0x4d6, 0x8001, 0x7, 0x4f, 0x3, 0x20000001}, @sadb_x_sa2={0x2, 0x13, 0x9, 0x0, 0x0, 0x70bd25}, @sadb_ident={0x2, 0xb, 0x17, 0x0, 0x7}]}, 0x40}}, 0x8000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)={0x2, 0xa, 0x67f0, 0x3, 0x7, 0x0, 0x70bd25, 0x0, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e21, @loopback}}]}, 0x38}}, 0xc800) sendmsg$key(r5, &(0x7f0000000000)={0x300000000000000, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900400000000000000000000000030006000000000002000000e0000059d8fd57186fe8a00002000100000000000000000200000000030005000000000002000000e00004000000000000000000"], 0x60}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0x20000001, 0x0, 0x0) [ 175.838467] SELinux: policydb version 1250300262 does not match my version range 15-31 [ 175.877033] SELinux: failed to load policy [ 175.896322] SELinux: failed to load policy [ 175.915038] SELinux: policydb version 1250300262 does not match my version range 15-31 [ 175.931648] SELinux: failed to load policy 10:24:36 executing program 5: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:36 executing program 0: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000240)={0x14, 0x49, 0x2, {0x1, 0x2, 0x2}}, 0x14) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x241, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000180)) write$selinux_load(r1, &(0x7f00000002c0)=ANY=[@ANYPTR, @ANYRES16=r2, @ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES64=r1, @ANYRESDEC=0x0, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="88d351c92d690b9c0a1ab33c831787", @ANYRESHEX=r1, @ANYRES32=r1]], @ANYBLOB="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"], 0x59) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/user\x00', 0x2, 0x0) 10:24:36 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) r0 = inotify_init() mknod(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_add_watch(r0, &(0x7f0000000600)='./file0/file0\x00', 0x400) umount2(&(0x7f0000000000)='./file0\x00', 0x1) 10:24:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000380)=0x801) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r2, 0x0, 0x10000) 10:24:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x480001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r1, &(0x7f00000000c0)=@sco, &(0x7f0000000140)=0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0xb, 0x800, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000001000)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80028}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000580)=ANY=[]}}, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x37) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000280)={@remote, @empty, 0x0}, &(0x7f00000005c0)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000007c0)={r4, 0x1, 0x6, @dev={[], 0x14}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) set_thread_area(0x0) r5 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x32aa) close(r1) accept4(r2, 0x0, &(0x7f0000000000), 0x0) readv(r2, &(0x7f0000000740)=[{&(0x7f0000000180)=""/250, 0xfa}, {&(0x7f0000000400)=""/145, 0x91}, {&(0x7f00000004c0)=""/250, 0xfa}, {&(0x7f0000000640)=""/232, 0xe8}, {&(0x7f0000001040)=""/4096, 0x1000}], 0x5) recvmmsg(r1, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0xfe64, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/212}], 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x2, 0x0) 10:24:36 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:36 executing program 1: r0 = socket(0x0, 0x0, 0x100091be) statfs(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000109, 0x0) syz_mount_image$msdos(&(0x7f0000000740)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000007c0)="1fdd2bd7434143dde436b5b9b3f8a61c7efc", 0x12, 0x4}], 0x8001, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000400)={{0x2, 0x4e21, @empty}, {0x1, @dev={[], 0xa}}, 0x0, {0x2, 0x4e20, @remote}, 'ifb0\x00'}) pipe2(0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000000)=[{0x94}]}) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 10:24:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "67d20a6f87c93c2540c5cd8f5eca3979ee14cb71dc995414d7cd21ff71f122f48658b0f054a10701b397037f7b91798bda097321def53a4a6726432bc8ed2f814273"}, 0x52) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket(0x2, 0x800, 0x10000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4002}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x8c, r3, 0x9, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x81}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8f9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x81}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xee}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8000}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xac}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x8c}, 0x1, 0x0, 0x0, 0x10}, 0x200480c0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0xc00, 0x4) [ 176.320582] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 176.334640] SELinux: failed to load policy [ 176.344540] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 176.354363] SELinux: failed to load policy 10:24:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000180)="666469c60633d01962d16e666f2f3300") sendfile(r0, r1, &(0x7f0000000040)=0x100d00, 0x100000001) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000380)={0x0, 'gre0\x00'}, 0x18) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000480)) personality(0x510000f) r2 = accept4$packet(0xffffffffffffffff, &(0x7f000000c640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000c680)=0x14, 0x0) keyctl$join(0x1, &(0x7f00000001c0)={'syz', 0x3}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x0, 0x6, 0x0, 0x9, 0xfffffffffffffffd}, 0x14) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r3, &(0x7f0000000240)='encrypted\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000440)={0x1, 0x3, 0x5, 0x2, 0x3}) 10:24:36 executing program 5: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) io_setup(0x10000, &(0x7f0000000040)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x46) r3 = fcntl$dupfd(r0, 0x0, r0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = eventfd2(0x8, 0x80001) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/policy\x00', 0x0, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/enforce\x00', 0x1, 0x0) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/checkreqprot\x00', 0x80400, 0x0) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/null\x00', 0x400, 0x0) io_submit(r1, 0xa, &(0x7f0000001b40)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x5, r0, &(0x7f00000000c0)="fd6fb0462cc2481cc3373b5aef4e24bbb03afb5e190f972cb7451ca5b87f5c3c1e9348b66ad0b4b43a82f0f2cc0762f0b19d32af2a18076087152f04d4221b5325be6b3b6508a862579dd71f76125879c6c09f04f07caf7d6cfbeaedae5cc3fe3d4413f8022df70bde3b3d3b67be186cf6a5737beb2319411904dd9dba4e2a2f7f601ea1dd35009270359c731ec4ff792d1116f03e93c68a70c0b671996eadbc81ad965461a638326b44a8dcd6e186f8ee15bc77598902b182dec21e4a20c0e6788dbb64b4c35befe800bade24028a5fe34a562ac01dfce6bbf72d7ef70a1001a85f", 0xe2, 0xfffffffffffffffb, 0x0, 0x0, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x9, r0, &(0x7f0000000240)="d3e117d2b2c29d8ba66a05f53d2aa58845cfef55a290375b2db157d1cd63e012b2f44d873e6da2c89a75df70f5a2dfadefbb4b483460222688a156046e16bbe44f81fc60617b4a64607599162b534a5a87d07abc638e2b989aa7834c13d54bc2381d44ff7420c8d1fcc98bd8eb1a3c90fce3b5c0841d83febb569a59e4f3304ef2a527bb5c766c84494209ef954a689425", 0x91, 0x6, 0x0, 0x3, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xf, 0x3, r0, &(0x7f0000000340)="c2f9f684fd60a0bd5c8c5f9fb0361147be0a7cb5e6821a6aca487514434537df431497f73cefb0ab506971f70b67361a0f68993e6d4dee", 0x37, 0x4, 0x0, 0x1, r3}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x6, 0x3, r0, &(0x7f00000003c0)="4654f62fe0aeefa3a397143342f8e102abbe13e4428889f4a27a94d753c887955bade9cec3af484ec609e591b20aa355e57863b96a760ddc87e29d16b312efe66c866b2a7c44457c25b286bf4fc3bdd1dc8d45b8a0df11e91ad3473e5227e08932699479a2edf9b3afa2b9c3c9d0eec89cb86f3f27fbbd200b32b3029078b6ac09b19c8957adcf1db41343a3bf5461695c0b089915041a2b31cb6750cb9b88ebe4489fe18c7afb55179ea926248e3fe90620fff73d", 0xb5, 0x5, 0x0, 0x0, r4}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x7, 0xffffffff, r0, &(0x7f0000000500)="5f6553d60bc15003ca0990ab9c6c2dfdffc658b29f6885531175154ed3e77d2d71cd9733c918e864fea40fd91e24848a752e736cb78c51bb413f7e6ad6329890ab21effeaad55e9bc5922a4d09e2ab0bd2f71227f3af7927c85821bfb158b466a5c36ac4c49000503c03feb65584f25c64aa36ebf0615687660bbd6256319ffe594d414ef60819b059f1c44400e87664d214a8f581a2207600f99524f44369451c88c72a2b6756783d2ea339c591a84aa72a8a6f301e4332ba555894e7cc67ee001d86b80e4b681874b83dd680b4b3b692d813d168a857ca650fd4", 0xdb, 0xf3, 0x0, 0x1, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x5, 0x101, r0, &(0x7f0000000640)="41ccfb2c01e7d1029bdb3eb3210ace7c52a1f915874dcaa2ea03d47110e19c915e4f72f87e4f592a6a8c11dee9fb05af977bb1e429266485b37697cd7028c298d4a17b0da5ee6627deeeeaf6920281daf8594b1d02de5f48410218126635a60f4dc90e0aa54e8ad12a49cd8614f6623dc2523fbc1b0d07d354aae8b7e0ce5790179c85952d3afb31f299a02de49be9a647aca78a49159c31ea241cb44d54c11cb94ff15314e0380f78f2703b09ef39468fab090c0312a0984bb700e0496d67487b5352", 0xc3, 0x2bd, 0x0, 0x1, r6}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x3, 0x10000, r0, &(0x7f00000007c0)="aa1f3e9ebed6ac6443a1c5161294d544de6a1e90f50c5113a6e4453a309d1407fdf755f6", 0x24, 0x0, 0x0, 0x2, r7}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x7, 0x1800000, r0, &(0x7f0000000880)="7e97356fdc7a647071f0bc4fffffbb53e8722947917fd4385ce4a50c9b296b6a3ebc44d3442b6c7cda73f8c472e82ef1b5ff22ad1d4725574be35b90ffb1c75629887b847af7cbf680d73c8153e912adcb2b24cf806147dcb4eb8f79be5fa5652af75e382ec3af2c30b61d39a607503565c00ee8f388f2b879825b3c90e1644ce50d6e1373756eb696167ea4fca07843ad3f08a58fca81086db739fd90f9a23f67eb", 0xa2, 0x9, 0x0, 0x2, r8}, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f00000009c0)="dc2bf80a26e454e64ed6869516fc054f9e09326e60babe60b40e8861c2b061a9a78db0ac2831bb9bc00c43be0e360e1dd3be0edf546adcd9e8549484970cb5d80454b49fdd6b561d9eb6e114eb3df14a31e9369ffb8e549dbad5c3580ad615a0c17810805fe8ad0cdd4e493ba7a827b508141027997ec244fb5f4d27e212bfce9f00bf413ade98aefd7b028538670a250de2c969c475cf3167ecdffbf197", 0x9e, 0x7, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x8, 0x8, r0, &(0x7f0000000ac0)="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", 0x1000, 0x1, 0x0, 0x2, r9}]) r10 = socket$inet6(0xa, 0x0, 0xc5) setsockopt$sock_int(r10, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r10, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) setsockopt(r0, 0xb, 0x835a, &(0x7f0000000000)="32b1edcb6470f4d43b8640d108b0d82c48bb151fe84033e759e2de2c0602133d9d0dcdd7d0f0d577a89c8edc0d6e946e5cfdb9999f00e9", 0x37) 10:24:36 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) [ 176.679151] SELinux: policydb version 1862980199 does not match my version range 15-31 [ 176.695819] SELinux: failed to load policy [ 176.701629] SELinux: failed to load policy [ 176.714557] SELinux: policydb version 1862980199 does not match my version range 15-31 10:24:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000000004c0000c9b8101523f516bfe43e016294b2dd9d064d87bd5f824778bf45056a39a15ae7f12323bd12c7acf5a7b6a15edf0f521edde1a68453b706dafbe4032d7e36b26cd613dbbd1c521d1c0b93a09bea000e378a50cf8a12cbfe1f287846"], 0x28) [ 176.728125] audit: type=1400 audit(1544091877.059:42): avc: denied { setopt } for pid=7003 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 10:24:37 executing program 2: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:37 executing program 5: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:37 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e2f66696c65320942a8243dabe0f5302076626f786e657430235c2720252d3a707070302520270a4df0d7c3d4f498eb52373c7fe67e5f30aca9ce23491a7c7e710200920c6d7bc4595e00dd4bee604369eacad381f6424634c7d9289d457809645a7fd32aa1e9180cd48bb9b62ef7b52d0ba1c2ef4460bf0f630d367f72782daf7f29df87121d9735d36f994e46ec311f1a101fcccaaa3f9b43860f3f9f2c5b3eac12682b902aefc459de9d3ede6fdeefcffc7c31a86bc41dbaf4c7cc9643e13c58ed54b07d606e0e8a6c033ff3af1d91cd7384d323ad6c0e"], 0xdc) epoll_create1(0x80000) [ 176.863945] SELinux: policydb string does not match my string SE Linux 10:24:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xb, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) flistxattr(r0, &(0x7f0000000200)=""/36, 0x24) alarm(0x200) ioctl(r0, 0x8, &(0x7f0000000140)="4c9e97faf6a8663e52fd738a852a9a9acd64116d72fc6f7a5bef9946cbcc5102e6bf12b98dd0b865d3b60df0492c69a37cad4b7e5dabf80871031f2fe025076c8b07fcdb8bf48adca9593322b4450215a3644509db9c3e16718b1d53588f1253779154be20f18bd826246d301d98e2c69d58c166c84f013e9308f3f9f4f1ed567c0f1f8204cdf16f8aa58baa9a53") 10:24:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) rt_sigreturn() r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x840, 0x2) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0x800, 0x5) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff99f90800000053b6c800006e757812000000004c0000000000000000dfffff0cf0e1a6873ca5369cbf1318dad5d42e8f955c7fe04a49d1e5d0b00f7ad09f7eeb037031ad6ce77dde450228f239e2beb87edcbcb7042194d8fcbd9da9a9744868a4effb28e11c151694ab4e00000000000000"], 0x28) 10:24:37 executing program 2: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:37 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:37 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x10040463f2) io_setup(0x3, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0xd00, 0x0, 0x7, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc}]) write$eventfd(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x5d) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0/bus\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:hwclock_exec_t:s0\x00', 0x24, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 10:24:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x6271ebcc, @local, 0xffffffffffffffc1}, 0x1c) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x280000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000100)={0x1000, 0x9, 0x12, 0x9}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040), 0x4) 10:24:37 executing program 1: r0 = socket(0x0, 0x0, 0x100091be) statfs(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000109, 0x0) syz_mount_image$msdos(&(0x7f0000000740)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000007c0)="1fdd2bd7434143dde436b5b9b3f8a61c7efc", 0x12, 0x4}], 0x8001, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000400)={{0x2, 0x4e21, @empty}, {0x1, @dev={[], 0xa}}, 0x0, {0x2, 0x4e20, @remote}, 'ifb0\x00'}) pipe2(0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000000)=[{0x94}]}) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 10:24:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) write$P9_RLCREATE(r0, &(0x7f0000000140)={0x18, 0xf, 0x1, {{0x10, 0x4, 0x8}, 0x5}}, 0x18) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c00)=[{{&(0x7f0000000400)=@l2, 0x80, &(0x7f0000000480), 0x0, &(0x7f0000000000)=""/117, 0x75}, 0x7}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) tee(r2, r1, 0xc525, 0x0) r3 = dup(r2) r4 = socket(0x0, 0xe, 0x0) ioctl$TIOCEXCL(r3, 0x540c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='ppp0vboxnet1.GPL@:bdevsecurity\x00'}, 0x10) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) lseek(0xffffffffffffffff, 0x0, 0x7) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) ioctl$LOOP_GET_STATUS64(r5, 0x4c05, &(0x7f0000000640)) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r5, 0x80003) sendfile(r2, r5, &(0x7f00000000c0), 0x8000fffffffe) recvmmsg(r3, &(0x7f0000003440)=[{{&(0x7f0000001840)=@ax25, 0x80, &(0x7f0000001d80), 0x0, &(0x7f0000001e40)=""/169, 0x42}}], 0x21b, 0x2000, &(0x7f0000003500)={0x0, 0x1c9c380}) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x214000, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r6, 0x10e, 0x2, &(0x7f0000000080)=0xc, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000100)=0x3ff, 0x4) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20002}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, r7, 0x4, 0x46, 0x25dfdbfd, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}]}, 0x44}, 0x1, 0x0, 0x0, 0x4010}, 0x8040) keyctl$join(0x1, 0x0) 10:24:37 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x92) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, 0x0) io_setup(0xc, &(0x7f0000000380)=0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x401, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000340)={0x3f, @dev={0xac, 0x14, 0x14, 0x19}, 0x0, 0x0, 'none\x00'}, 0x2c) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup3(r1, r2, 0x80000) getsockopt$inet_mreqsrc(r3, 0x0, 0x0, &(0x7f00000003c0)={@local, @dev, @remote}, &(0x7f0000000400)=0xc) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r2, 0x0) ioctl$EVIOCSABS2F(r3, 0x401845ef, &(0x7f0000000100)={0x10001, 0x0, 0xffff, 0xff, 0x0, 0x6}) r4 = socket$inet6(0xa, 0x400000000001, 0x0) waitid(0x2, 0x0, 0x0, 0x0, &(0x7f0000000480)) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000e77fff), 0x0, 0x20000008, 0x0, 0x0) lseek(r3, 0x0, 0x2) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0xc74, 0xffffffffffffffff, &(0x7f0000000180)="18a4b90076240cb83aae27ee03f531681e23aa3c1d15a950b98f408f5bcc678e68a805c82fb1c723d1105feb61af22fcf89795e8f5a13341f3201cde41fed352088e20eaffe564e899f088f6c03a8421d3a6f5deb0d983a93aeffcafcb55a95708dbe7e515d408dab60e0f6f6e334da668ce85018b1dd436515e6911150bba945716ced86c302934af36fd7b7c2a3cba404599f4cb93444dcb06849e49efc4b7bd49810f25087d2aae9104119abac1d270b6cb71be6e68f1822391a3d8763f90bd5bb5265b5157", 0xc7, 0x1, 0x0, 0x1}, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 177.387352] SELinux: policydb magic number 0x18 does not match expected magic number 0xf97cff8c 10:24:37 executing program 2: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) [ 177.546197] SELinux: policydb magic number 0x18 does not match expected magic number 0xf97cff8c 10:24:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001040)={'team0\x00', 0x0}) pipe(&(0x7f0000000380)={0xffffffffffffffff}) ioctl$TIOCSTI(r3, 0x5412, 0x4) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000001080)={@dev={0xfe, 0x80, [], 0xc}, r2}, 0x14) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x9f) connect(r0, &(0x7f00000010c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @loopback}, 0x1, 0x0, 0x4, 0x3}}, 0x80) sendmmsg(r0, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="848f4136bef5b23667cd97aac2309610effa21e747d78341aee42b049bf5b5d17d182e8ece253b9f848a9ee1b6e22edcfcaafd82aeb9d1d978fbf6e63f83c06bc3cad144b7d22a7409c2522800bede866654ce1d5b", 0x55}, {&(0x7f0000000200)="3151dd18f8684b0c0988fc843981270271b84ab2b9126d99c612434d379c95aaad1cdb95dd8ac6a51726ddbb383d773f3df566132bcee0969fe4f5d2ffe6120a102e5901091429ae2b59d2002c3c6b61cb132bc97dc2d6eb21f826c87d31dfea42a52d173f4adc166178d5e67ea37ad409cfdf54fad0cf64098c22a3471a90d1de166fe4b54a691cda12b094", 0x8c}, {&(0x7f00000002c0)="f63c0a1a1341894bdd941561387a99ce54c303e7e0a5fa1a7a586b1dc2b8d4eee88eb5cb30455a79b611eca5465910a37f30e1227bcde51bbaac126de583ec3e1d9f7c718978e30cccf1cb26cec44603beed2ddbe4c90fef8c36edf99c2ad693f71896027341280410b94a6b34297ab524e8061874588aff6b1bde8ad121be522860f78220b9609beb78654ddf17b4c806c05d85f51f14fc173dd5db0ff2214ca6f778e44112e07db83464c475b62ee6dd7d90f3da9eb1f97a", 0xb9}], 0x3, &(0x7f0000001140)=ANY=[@ANYBLOB="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"], 0x488, 0x44000}, 0x9}, {{&(0x7f0000000840)=@rc={0x1f, {0x7, 0x0, 0x4, 0x8, 0x0, 0x3}, 0x20}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000140)="a55947bbd5c1a621765d3dc84c6f7bda8da9aba2a0c9bf26ff820e378928097567429e7ecc15b6ad4b8933080cbe1432", 0x30}, {&(0x7f00000008c0)="e0628cb9e5c48d543850f0f6a3281827626fa0465fc1576609593bbe1bcc0cf92c9c969d937afa23efef655eebd6c3a96cb26caacef1e22c55043c9a850cbcedf87427a3ee12c48baa3dc070cf6d7882378e6a895529b3c27ee2a57a028602b57bfe4f6f391286281f5b11e96879647c86fe2f586617c9016e5158fa80fcec5704707c621fd900d59f84738deb2fbc644f56b930ea1cc337809f47df5fe6497fea0394c0b143a994933129fd31a5fe146324e7f5e7e52dca14f396b82c509f15eb333c228100c63379aa15227e27beaa6b", 0xd1}, {&(0x7f00000009c0)="5bdc30a751922db9ff9d3758a2364e9cbfc0541bc70a4e465e91374aa6c1c5342124d5b1c2ccd2279ec08482286482acd68fd66a7242ac32c1d6425b322775a1731752bab4a43008a3e4b6056d2e2f103305426539f906e68ac7152a46e9e986c33a5dbd530c95f842a25f79f7bc72c6cffb1e1d7547376c7df4bbdec77e3eb797c3ca38108af3c27c6d8206c4e2cbf8fa49f9b3245b3036453481472a3a72beb3f36bdb5b44476f2f0d", 0xaa}, {&(0x7f0000000a80)="d2f4d5578e2f537fa5580453c137952f06357813e1a85dd755860c37c3ba673d93655dff95017e152a5b271acece4a1e84ce71a8578c99eef2ee9034158ab5d628b90ce0b0d3056f6cbb60f814a5d21d764c492ba55273ddd93336d5cc121fbe6e7fbaabd751ec911e85d82ffd6bd2693d2b34b9e0aafab377330cf4c4a93ea7b43a8f02246e75c47aec096106039dc73e3ff08808f0f83303bca7771ade5436f27add386b", 0xa5}, {&(0x7f0000000b40)="6e5f61adfc2c72da2fd4518790430ab1a874e1733472b8cb0fa80f85464994477b150a608540dd460d721f12582f2629345c691320c59c415438247c25170388008196eb9495e57565282aba51b0020d5f194c03522eaee4c1d70639ad175bcbc1a33246f3b7", 0x66}, {&(0x7f0000000bc0)="7cc3c63abb8557bc3fde110faf2f0957aa", 0x11}, {&(0x7f0000000c00)="6c529a98c65679b045f1f5a81cba86b3587f60bba55eae1c8349496ef308832e7facf5ffdc5609999111b406812023aab14156c7673c5ce56caa4399d86b222c7bf2f751661f6692316176779e69d76e0fd28bd9fde5bf797c55d5fefddd7763743d2cdd7564b1f2d80c638eaa22742fef83685b331959011befd10361c1f04f3b6aa248263ace35c54add429dd6b96913126994285ffee554cea928cb9411dcac0a15ffeed373ab7f19799144c9335bf80b6119a3b4cbe4076842c8b949afe8c3a169d6661d40557bf7c4b6f5ab3bcee0cca7b908247b", 0xd7}], 0x7, &(0x7f0000000d80)=[{0x58, 0x113, 0xe4, "a314187c7497cd479b40976a6a6760b9e5d5a56caf9577d74bbee45830cd8f28bdd2ccee77ae480e42e755107cdc8d5a43c4fbb60ad3c1a016047f677dda91f1ea923064ae"}, {0xf0, 0x10f, 0xfffffffffffff61d, "d8af53fd31e6afcbbbfe937a9cb07812ec4ccb8953487e5d9de220f96ef5dbd59effd8ec24fde70118b38dc49bd9a470a63504fd62301a6da9793ca8af351c9a8bd247355ef024bc2b2dfed338651d4d8d6742c21943d57ffb07e15483b85dfc48ae0b55a430ef6c585c69b7be0cd55d8574bbd65f81480be2971cea26ceb42046eea2d1bc864d2205bacf81cea782b84252a0e0f6a5257ede381faab2ea3e932e17fba5463a071ab620a7137432e8f6fdeb7207689171f5b9d787d1488440dccde28a2cb2e67c6b1a6a1583b2bc0897e9a4ed0a816429f83bdd97"}, {0x90, 0x187, 0x1, "5d2445d85ae12b70fceb5a68b48274dcf3def53dc1df486f5cc26753134bd49b9370b6ff1c4ff1485f6ba1136ad855ed268dddcbadc384f35b9d9ec3b91d23eb0ed5d64d2812ef1612955c5158574ddfa245af3537d70e09ccacf4d5b5b0f3620c7077430a4d5cb5b63dbe3584898b255760181199a816d23e8970b9"}], 0x1d8, 0x4}, 0xfff}], 0x2, 0x0) 10:24:38 executing program 0: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/load\x00', 0x2, 0x0) r0 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)='/selinux/status\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x7fff, 0x6, 0x14aa94a, 0x2, 0x0, 0x101, 0x40100, 0x4, 0x2, 0xa270, 0x8, 0x3, 0x8, 0x2, 0x8001, 0xa9, 0x100000001, 0x5, 0x3a42, 0x5, 0x20, 0x1000, 0xfffffffffffffffa, 0xfffffffffffffffc, 0x400, 0x7fffffff, 0x4c, 0x6, 0x20000, 0x2cb82ae, 0x800, 0x4, 0x100000001, 0x4, 0x200, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x7}, 0x0, 0x1, 0x101, 0x0, 0xff, 0x5, 0x8}, r1, 0xe, 0xffffffffffffffff, 0x8) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) getpeername$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x2, 0x3, 0xff, 0xc, 0x2, 0x8, 0xfffffffffffffffc}, 0x20) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @loopback}, {0x1, @local}, 0x40, {0x2, 0x4e22, @multicast2}, 'dummy0\x00'}) 10:24:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff3cf9080000005345204c696e757812000000004c000006000000070000003c9f000000060000"], 0x28) 10:24:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040)=0x2, 0x4) [ 177.786158] SELinux: policydb magic number 0xf93cff8c does not match expected magic number 0xf97cff8c 10:24:38 executing program 2: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x20000, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/24) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x568}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140)=0x2, 0x4) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000109, 0x0) syz_mount_image$msdos(&(0x7f0000000740)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000007c0)="1fdd2bd7434143dde436b5b9b3f8a61c7efc", 0x12, 0x4}], 0x8001, &(0x7f00000008c0)={[{@fat=@nocase='nocase'}, {@dots='dots'}]}) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000340)={'bridge_slave_0\x00', 0x574}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0x4) write$P9_RREADDIR(r0, &(0x7f00000000c0)={0xe4, 0x29, 0x2, {0x8, [{{0x91, 0x1, 0x3}, 0xe8, 0x2, 0x7, './file0'}, {{0x1, 0x0, 0x6}, 0x1f, 0x81, 0x7, './file0'}, {{0x8, 0x0, 0x3}, 0x0, 0x7, 0x7, './file0'}, {{0xa, 0x1, 0x1}, 0x8, 0x1, 0x7, './file0'}, {{0x1, 0x3, 0x3}, 0x3, 0x7, 0x7, './file0'}, {{0x2a, 0x4, 0x3}, 0x8, 0x100, 0x7, './file0'}, {{0x0, 0x2, 0x6}, 0x8001, 0x7, 0x7, './file0'}]}}, 0xe4) 10:24:38 executing program 3: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(0xffffffffffffffff, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8202, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x7, 0x1748, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000040), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x8, 0x6001, 'ifb0\x00', 'dummy0\x00', 'irlan0\x00', 'veth1_to_team\x00', @remote, [0xff, 0xff, 0xff, 0x53de54219b3cff28, 0x0, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0x138, 0x180}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x10001, 0x3, 0x1, 0x0, 0x0, "a87dd0d9b3efb69d8fc2836eb005736eeed4a14633f743862b527def8fe598caf782ea943f4dd1b446b17b665ab6bafbd3c1280caef4a91757861712ba19fd0a"}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x7d, 'syz1\x00', 0x9}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"61eed5ce3573929d1d7eaa1ed0a2ff936126ef18e602787aee8950f06ddb"}}}, {{{0x85d1f820f9f87ffd, 0x4a, 0xdbff, 'veth0_to_bridge\x00', 'bridge_slave_0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], @remote, [0xff, 0x0, 0xff, 0xff, 0xff], 0xe0, 0x258, 0x2a8, [@stp={'stp\x00', 0x48, {{0x1, {0x401, 0xfffffffffffffffb, 0x6, @local, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0x44, 0x7283, 0x10001, 0x0, @dev={[], 0xe}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0x4e23, 0x4e23, 0x9, 0xf31, 0xa77, 0x89, 0x6, 0x9, 0x1ff000000, 0x1}, 0x10a, 0x1}}}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x9, 'system_u:object_r:devicekit_exec_t:s0\x00'}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x0, 0x8, 0x6}}}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x0, 0xff, 0x9}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{{{0x9, 0x50, 0x8863, 'team_slave_1\x00', 'veth0_to_bond\x00', 'gretap0\x00', 'bridge0\x00', @random="474233749203", [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @dev={[], 0x1b}, [0xff, 0xff, 0xff, 0x0, 0x3a006d0d5afe0f0b], 0x968, 0x9e0, 0xa30, [@among={'among\x00', 0x880, {{0xffffffffffffa099, 0x8000, 0x2, {[0xffffffff, 0xfff, 0x4, 0x948, 0x1ff, 0x4, 0xfffffffffffffffa, 0x5, 0x2, 0xe3e, 0x4029, 0x5, 0x1ff, 0x5, 0x101, 0x0, 0x5, 0x81, 0x3f, 0x2, 0x1, 0x3, 0x0, 0x9, 0x100, 0x7f, 0xd559, 0x800, 0x3, 0x7fff, 0x0, 0x7, 0x4, 0x7, 0x3, 0xc30, 0x6, 0xffffffffffffffff, 0x7fffffff, 0x9, 0x5, 0x9, 0x824, 0x2, 0x7fffffff, 0x8001, 0x4, 0x4, 0x0, 0x8, 0x6, 0x400, 0x1, 0x3, 0x0, 0x1f, 0x8, 0x4, 0x8, 0x3, 0x81, 0x3, 0x6, 0x1, 0x5, 0x81, 0x9, 0x10000, 0x5, 0x6, 0x1, 0x1, 0x5, 0x10001, 0x0, 0x2, 0x7fe, 0x8, 0x2, 0x9, 0x7, 0x4, 0x4, 0x81, 0x5, 0x4, 0x7fffffff, 0x100000000, 0x0, 0x8, 0x7, 0x8001, 0x5, 0x100000000, 0x8000, 0xfffffffffffffe00, 0x800, 0x8001, 0x9, 0x3, 0x2, 0x8, 0x0, 0x8, 0x3, 0x0, 0x6, 0x272e, 0x40, 0x4, 0x20, 0x7, 0x8, 0x2, 0x4d29, 0x0, 0x0, 0x10001, 0x10001, 0x4f962307, 0x7, 0x4, 0x0, 0x81, 0x732, 0x7, 0xb4f1, 0x1, 0x7, 0x7, 0x9, 0x9, 0x3, 0xb63, 0x40, 0x6, 0x80, 0x7, 0x1000000000, 0x6, 0x7fffffff, 0x9, 0x7a4c, 0x4, 0xe, 0x101, 0x1ff, 0x20, 0x3ff, 0xffff, 0x1, 0x0, 0x2, 0x8001, 0x2, 0x6, 0xffffffffffffffff, 0x7f, 0x5, 0x10000, 0x6, 0x40, 0x7, 0x29, 0x2, 0xfe000000, 0x0, 0x9, 0x4, 0x3ff, 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x7, 0x81, 0x3, 0x3, 0x80000001, 0x2c3b, 0x200, 0xffffffff, 0x0, 0x8, 0x0, 0x8, 0x8, 0x8, 0xbaa, 0x4, 0x5, 0xfa, 0x800, 0x9, 0x0, 0x3, 0x9, 0x3, 0x6, 0x5, 0x20, 0x1, 0x3fc, 0x3, 0xfffffffffffff5a5, 0x2, 0x2, 0x0, 0x60f14432, 0x2, 0xfda569c, 0x5, 0x400, 0x0, 0x3b, 0xef4, 0x1f, 0x100000001, 0x8, 0x8000, 0x3, 0x9, 0x0, 0x7, 0xcb60000000000000, 0x3, 0x0, 0x1, 0x1, 0x4cfc669e, 0xffffffffffffff01, 0x12, 0x8000, 0x5, 0x6, 0x4, 0x0, 0x7, 0x0, 0x7, 0x3, 0x6, 0xfb33, 0x1, 0x0, 0x3, 0x0, 0x400, 0x4, 0x3, 0x6, 0x3, 0x1, 0x3c8, 0x5, 0x24b52b24, 0x8001], 0x2, [{[0x48b, 0x66a7], @multicast2}, {[0xf469, 0x3], @remote}]}, {[0x7, 0x24e, 0x3, 0xd7da, 0x7, 0x5, 0x800, 0x80000000, 0xca, 0x100, 0x5, 0xffffffffffff7fff, 0x7, 0x5, 0x9, 0x7fffffff, 0xbfc, 0x100000000, 0x6, 0xff, 0x2, 0x1, 0x5, 0x2, 0x2, 0x5625, 0x8, 0xfff, 0xb79d, 0x20, 0x5, 0x93, 0x1ff, 0x872, 0x6, 0x1f, 0x5, 0x7ff, 0x2, 0x7, 0xda, 0x0, 0x3ff, 0x7, 0x1, 0x65f1, 0x1ff, 0xdd3, 0x5, 0x9, 0x8, 0x401, 0xfffffffffffffff7, 0x2, 0x3, 0x1, 0x9, 0x0, 0x80, 0xd40, 0x3, 0xffffffffde70cf51, 0x7f, 0x6, 0x7, 0xf4, 0x5, 0x6, 0x1, 0x1, 0x7fff, 0x1000000000000000, 0xcd, 0x6, 0x81, 0x5, 0x4, 0x7, 0x3f, 0x2, 0x80a5, 0x6d, 0x8, 0xfffffffffffffe00, 0x0, 0x8, 0x9, 0x1000, 0xe22, 0x6, 0xfffffffffffffffd, 0x7, 0x74a, 0x7fffffff, 0xdf, 0x3, 0xffffffffffffffff, 0x3ff, 0x0, 0x4, 0xfffffffffffffffe, 0x9, 0xfffffffffffffffb, 0x4, 0xd8c7, 0xfffffffffffff764, 0x792, 0x8, 0x5, 0x8, 0x7, 0x1000, 0x1b5b, 0x4, 0x0, 0x7ff, 0x5, 0x7, 0x23, 0x2, 0x1000, 0x7fffffff, 0xfffffffffffffffb, 0x2, 0x2, 0x8000, 0x1, 0x1, 0x7, 0x10000, 0x6eb7, 0x7f, 0x4, 0x7, 0x5, 0x8, 0x5, 0x2, 0x4, 0x3, 0x80, 0x95, 0x2, 0x8, 0x5, 0x3, 0x2, 0xe20, 0x5af, 0x1f, 0xfffffffffffffbff, 0x44, 0x0, 0xfffffffffffffffc, 0x8, 0x3f, 0x69, 0x4, 0x4, 0x2, 0xba6d, 0x5, 0x5, 0x8001, 0xfff, 0x927, 0x2, 0x100000000, 0x7, 0x8, 0x6, 0x8, 0x3f, 0x20, 0x101, 0x401, 0x5, 0xfffffffffffffff8, 0x3cba, 0x2c, 0x101, 0x0, 0x955, 0x8, 0x1000000, 0x20004000000, 0x7, 0x10000000000, 0x6, 0x7, 0xe9, 0x5, 0x5, 0x1000, 0x6, 0x29d, 0x103, 0xffffffff80000001, 0x6, 0x9, 0xfffffffffffffffc, 0x8, 0xfffffffffffffffd, 0x4, 0x7ff, 0x64, 0x81, 0x200, 0x240, 0x46, 0x5, 0x401, 0x100000001, 0x0, 0xffffffffffffffff, 0x57, 0xcd6, 0x800, 0x5, 0xffff, 0x5, 0xffff, 0x84, 0x3, 0x9, 0xbd, 0x4, 0x1, 0x1, 0x400, 0x7, 0x6, 0x9, 0x20, 0x8, 0x9, 0x1, 0x4, 0x5, 0x1ff, 0x5, 0x80, 0x7465, 0xd4d, 0x7ff, 0xfc, 0xff, 0x6, 0x6, 0x2000000, 0x4e80ee8e, 0x4, 0x8000, 0x6, 0x1, 0x400], 0x6, [{[0x100000000, 0x1ff], @broadcast}, {[0x6, 0x445], @local}, {[0x5], @multicast1}, {[0x4, 0x10000], @empty}, {[0x1, 0x200], @broadcast}, {[0x4, 0xfffffffffffffff9], @multicast2}]}}}}, @nfacct={'nfacct\x00', 0x28, {{'syz1\x00', 0x8}}}]}, [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x8, 0x1, 0x3, 0x1, 0x0, "7d391904923beac4a03c2b11f4f7f72e51b7dc974cdb7e7503686580efb5fdfff429c1b90c1a1d67bd9282b28ceb353db1a0a1978463e389251159da5503860e"}}}]}, @common=@log={'log\x00', 0x28, {{0x7, "d3185f79480cc114cfbd66d8f33daa1b1d52d4392a94bebbb2aea25a103a", 0xa}}}}, {{{0x11, 0x2, 0xeaef, 'veth1_to_team\x00', 'bridge_slave_1\x00', 'veth0_to_bond\x00', 'veth1_to_bond\x00', @random="df3ba8a87394", [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0xff], 0x110, 0x110, 0x140, [@m802_3={'802_3\x00', 0x8, {{0xf4, 0x7fffffff, 0x6, 0x6}}}, @stp={'stp\x00', 0x48, {{0x80000000, {0x4, 0x3, 0x660, @local, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], 0x0, 0xfffffffffffffffa, 0x100, 0x8, @local, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x4e22, 0x4e22, 0x9, 0x0, 0x5, 0x910c, 0x2, 0x37e, 0x6, 0x4}, 0x40, 0x1}}}]}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x39, 0x200, 'team0\x00', 'ipddp0\x00', 'gretap0\x00', 'ifb0\x00', @dev={[], 0x14}, [0xff, 0x0, 0x0, 0xff], @random="3d271774c492", [0x0, 0x0, 0xff, 0xff, 0xff], 0x70, 0xd0, 0x118}, [@common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x2}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x80, 0x40, 0x2b78}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff, 0x2, [{{{0x3, 0x10, 0xef9e, 'veth1_to_team\x00', 'veth0_to_team\x00', 'bcsh0\x00', 'bridge_slave_1\x00', @remote, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x1e}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0xb0, 0x128, 0x178, [@statistic={'statistic\x00', 0x18, {{0x0, 0x0, 0x6, 0x499, 0x0, 0x2}}}]}, [@common=@nflog={'nflog\x00', 0x50, {{0xffffffff, 0x1, 0x3, 0x0, 0x0, "a2e4c3fdd5bf11683ae3a17314cf02f3989dfa6ad9fa26e5180e7f871b8437551ce52351abc6e2b943e5cf8b09aa5fbd5b4968a6de2b560da2336bd5f11417aa"}}}]}, @common=@log={'log\x00', 0x28, {{0x5, "3129527dd59b14a67c01b7a38853b3bb06e657ee51e2ee17541fca3dab50", 0x1}}}}, {{{0x9, 0x20, 0x8b17, 'veth1_to_bond\x00', '\x00', 'team_slave_1\x00', 'vcan0\x00', @empty, [0x0, 0x0, 0xff, 0xff], @random="9867151a0862", [0xff, 0xff, 0xff, 0x66aae5c639f3b8f9], 0x1d0, 0x430, 0x460, [@cluster={'cluster\x00', 0x10, {{0x1, 0x7, 0x3, 0x1}}}, @comment={'comment\x00', 0x100}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x4, 'system_u:object_r:devicekit_exec_t:s0\x00'}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x100, 'system_u:object_r:fonts_t:s0\x00'}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}]}, 0x17c0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:38 executing program 1: r0 = socket(0x0, 0x0, 0x100091be) statfs(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000109, 0x0) syz_mount_image$msdos(&(0x7f0000000740)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000007c0)="1fdd2bd7434143dde436b5b9b3f8a61c7efc", 0x12, 0x4}], 0x8001, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000400)={{0x2, 0x4e21, @empty}, {0x1, @dev={[], 0xa}}, 0x0, {0x2, 0x4e20, @remote}, 'ifb0\x00'}) pipe2(0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000000)=[{0x94}]}) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 10:24:38 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) mkdir(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') ioctl$RTC_WIE_OFF(r0, 0x7010) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400a00) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa81e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000000c0)) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x2) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioprio_get$pid(0x1, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x0, 0x200, 0x20, 0xfffffffffffffffe, 0x5}, 0x1c) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000002c0)={'nat\x00'}, &(0x7f0000000200)=0x78) socketpair$nbd(0x2, 0x1, 0x0, 0x0) r1 = getpid() capset(&(0x7f0000000000)={0x19980330, r1}, &(0x7f0000000180)={0x800, 0x7, 0x0, 0x1f, 0xfffffffffffffff8, 0x7fffffff}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x94b, &(0x7f00000003c0)="dea0d4e9315762047046aae4f6198d6bd7a047aa5546cbbd7ca40f62212f0a3244272531b3647a48382c") openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003c00)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fc, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') unshare(0x0) 10:24:38 executing program 0: ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000000)={0x0, 0x2, 0x1, 0xffffffffffffffff}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000100)="f136f71b172c178055ee4f2344412aadd31caa4f83bc24c562742fdba172479a8a22a0f3ccfb1ebd78223eb21ce8f7d22deeb9c16818a630309c8bf8b0b6c1c47276e4bf1faeeb3fa629ffecf7a73c00a445e978d985fc0e7e4c28fa0f8e275f1359e0355c170cdcac1e7cb70d6f6ceedadac2bb9d19b7071f826e00e9ff363da3cb93fd386fdec25a38dddad851cca325abbcae66d0d2992796d43a3342ef2474ed33bda6e8ce7f135e2902fa656f7e5c9e8d9c6e4df9bde8bb6ff521657b7129b6dc605aac75342accf19935ff9d3e62b0afa3f3dc66cad7977dd1d375879235c77ccf998fa3c67ca8e7d31e646c3e3cc1bf01792d7f1fa260aa21baaeaf1c") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r2 = dup3(r1, r1, 0x80000) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) write$selinux_load(r1, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:38 executing program 3: pipe2(0x0, 0x80000) r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) sendto(r0, &(0x7f0000000000)="682a5795f51316a6df2ac522761abeb6e395299d63db2d7632243529f21a90bbeb588ff33ea7ca7076fb45e410495202e35e89ce47658ea76d3ca77262b56c52b521fc14a1320821f457f03e9129455b12c4ab8cecc66c34dcbb97147deab6dac6f67e4e041ec6cd133c26f52ff71b0a4f756dcce6e2a3a26bbeac6f5a565d1d08c26747685798489bd9a9", 0x8b, 0x8801, &(0x7f0000000100)=@sco={0x1f, {0x5, 0x6, 0xad66, 0x401, 0xff5a, 0x6}}, 0x80) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x7) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000040)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x30000, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 10:24:38 executing program 5: pipe2(0x0, 0x80000) r0 = creat(&(0x7f0000000280)='./file0/file0\x00', 0x84) r1 = syz_open_pts(r0, 0x40000) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r3, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r1, 0xb) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(r0, 0x5605) 10:24:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x2) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0xff) fgetxattr(r0, &(0x7f0000000100)=@random={'system.', '#(self%keyring,+cgroup-securityem0%eth0cgroup\x00'}, &(0x7f00000001c0)=""/4096, 0x1000) r2 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffb) keyctl$invalidate(0x15, r2) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x29, &(0x7f0000000180)=0x4c08, 0x4) sendmsg(r1, &(0x7f00000014c0)={&(0x7f0000716000)=@in, 0x80, &(0x7f0000685000)=[{&(0x7f0000001480)="b5887200000000000000000057a2d32741000000", 0x14}], 0x1, &(0x7f0000000000)}, 0x0) 10:24:39 executing program 2: pipe2(0x0, 0x80000) r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:39 executing program 0: set_thread_area(&(0x7f0000000000)={0x78ce, 0x20000000, 0x2000, 0x4, 0x1, 0x2, 0x6, 0x80, 0x0, 0xffffffff}) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='tracefs\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) fcntl$setpipe(r1, 0x407, 0x2) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) accept$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) accept4$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14, 0x80800) sendmsg$nl_route(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2002004}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="a4000000190000002dbd7000fedbdf251c9410bfff00ff02000200002400010080000000000000100000000000000000000000000000000000000090000000000c0001007607fc0c000000000c000100000000000004001008000400", @ANYRES32=r3, @ANYBLOB="14000100000000000000000000000000000000800c0001000000000000000000140001000000000000000000ff0000000000000008000400", @ANYRES32=r4, @ANYBLOB="08001a0008000000"], 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x40408c0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000080)={'teql0\x00', @link_local}) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="84ff7cf9080000005345204c696e757812000000004c00010600ffffffff00003c9f000000060000"], 0x28) 10:24:39 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 178.844132] SELinux: policydb magic number 0xf97cff84 does not match expected magic number 0xf97cff8c [ 178.899046] SELinux: policydb magic number 0xf97cff84 does not match expected magic number 0xf97cff8c 10:24:39 executing program 1: r0 = socket(0x0, 0x0, 0x100091be) statfs(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x400000000000109, 0x0) syz_mount_image$msdos(&(0x7f0000000740)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000007c0)="1fdd2bd7434143dde436b5b9b3f8a61c7efc", 0x12, 0x4}], 0x8001, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000400)={{0x2, 0x4e21, @empty}, {0x1, @dev={[], 0xa}}, 0x0, {0x2, 0x4e20, @remote}, 'ifb0\x00'}) pipe2(0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000000)=[{0x94}]}) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 10:24:39 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0x7) 10:24:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x5, 0x4) 10:24:39 executing program 5: accept$inet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x29) open(&(0x7f0000000040)='./file0\x00', 0x521202, 0x4) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="fd86b00eb8dd06e3ad071cd4685c", 0x0, 0xf000}, 0x28) lookup_dcookie(0x800, &(0x7f00000004c0)=""/216, 0xd8) r3 = dup3(r0, r2, 0x80000) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000000)) 10:24:39 executing program 2: pipe2(0x0, 0x80000) r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:39 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)={0x0, 0x0}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x40000, 0x0) r1 = socket(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000480)={0x4, 0xffff, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x85c, 0x8, 0x0, 0xb88}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x5, &(0x7f0000000080)=""/109, 0x6d) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000340), 0x0, 0x1, 0x0, 0x0) r4 = dup2(0xffffffffffffffff, r3) getpriority(0x2, r0) sendto$inet6(r4, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xffffffffffffff00, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[]}}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x20000, 0x0) recvmsg(r3, &(0x7f0000000440)={&(0x7f0000001500)=@ax25, 0x80, &(0x7f0000002a00)=[{&(0x7f0000001580)=""/129, 0x81}, {&(0x7f0000001680)=""/128, 0x80}, {0x0}, {&(0x7f0000002880)=""/178, 0xb2}, {&(0x7f0000002940)=""/162, 0xa2}], 0x5, &(0x7f0000002a80)=""/188, 0xbc, 0x8}, 0x40) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r6 = getgid() setgid(r6) ptrace(0x4207, r0) tgkill(r0, r0, 0x3a) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@mcast2, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) 10:24:39 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000140)=0x100000000) openat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000000)=""/14, 0xe, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080)=0x2, 0x4) write$selinux_load(r2, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) 10:24:39 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_setlink={0x34, 0x13, 0x600, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x400, 0x2400}, [@IFLA_EVENT={0x8, 0x2c, 0xffffffff80000000}, @IFLA_ADDRESS={0xc, 0x1, @dev={[], 0x15}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:39 executing program 5: accept$inet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x29) open(&(0x7f0000000040)='./file0\x00', 0x521202, 0x4) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="fd86b00eb8dd06e3ad071cd4685c", 0x0, 0xf000}, 0x28) lookup_dcookie(0x800, &(0x7f00000004c0)=""/216, 0xd8) r3 = dup3(r0, r2, 0x80000) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000000)) 10:24:39 executing program 2: pipe2(0x0, 0x80000) r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:40 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:40 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_setlink={0x34, 0x13, 0x600, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x400, 0x2400}, [@IFLA_EVENT={0x8, 0x2c, 0xffffffff80000000}, @IFLA_ADDRESS={0xc, 0x1, @dev={[], 0x15}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000200)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0xfffffffffffffffd) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002bc0)={@mcast2, 0x0}, &(0x7f0000002c00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002c80)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000002d80)=0xe8) accept(0xffffffffffffff9c, &(0x7f0000002dc0)=@can={0x1d, 0x0}, &(0x7f0000002e40)=0x80) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000002f00)={@loopback, 0x0}, &(0x7f0000002f40)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003080)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f00000030c0)={@dev, @broadcast, 0x0}, &(0x7f0000003100)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003140)={0x0, @multicast2, @loopback}, &(0x7f0000003180)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000031c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004880)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000048c0)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000049c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004a00)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004a40)={0x0, @local, @multicast2}, &(0x7f0000004a80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004b80)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000004c80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1b, &(0x7f0000004d00)={@mcast1, 0x0}, &(0x7f0000004d40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004e80)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000004f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005040)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000005140)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f00000051c0)={@mcast2, 0x0}, &(0x7f0000005200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005300)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@multicast2}}, &(0x7f0000005400)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005440)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000005540)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000005680)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000088c0)={@remote, 0x0}, &(0x7f0000008900)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000008940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008980)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f00000089c0)={'veth1_to_bridge\x00', @ifru_addrs=@can={0x1d, 0x0}}) accept(0xffffffffffffffff, &(0x7f0000008a00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008a80)=0x80) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000008bc0)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000008cc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000008d00)={@multicast2, @multicast2, 0x0}, &(0x7f0000008d40)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000008e40)={@empty, 0x0}, &(0x7f0000008e80)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000008ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008f00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008f40)={{{@in, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000009040)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000009080)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffff9c, &(0x7f0000009100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000009140)=0x14, 0x80800) getpeername$packet(0xffffffffffffff9c, &(0x7f0000009180)={0x11, 0x0, 0x0}, &(0x7f00000091c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000009380)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000009480)=0xe8) recvmsg(0xffffffffffffff9c, &(0x7f000000b680)={&(0x7f000000a500)=@can={0x1d, 0x0}, 0x80, &(0x7f000000a640)=[{&(0x7f000000a580)=""/172, 0xac}], 0x1, &(0x7f000000a680)=""/4096, 0x1000, 0x10001}, 0x10000) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f000000c5c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20200}, 0xc, &(0x7f000000c580)={&(0x7f000000b6c0)={0xe9c, r2, 0x400, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x1d0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x401}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0xfffffffffffffffa, 0x8, 0x81, 0x7}, {0x6, 0x9, 0x400, 0x8}, {0x5, 0xffffffffffffff81, 0x7, 0x5}, {0x4, 0x8, 0x3, 0x3}, {0x9, 0x21, 0x8, 0x1}, {0x7, 0x1, 0xe6, 0x2}, {0x3f, 0xffffffff7fffffff, 0x8, 0x1}, {0x2b85, 0x1e7, 0x7, 0x4b0000000000000}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xc291}}}]}}, {{0x8, 0x1, r5}, {0x1dc, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x43}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x1b8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x67e100c9}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r14}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0x144, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x695d319a, 0x5a, 0x100000001, 0x9}, {0x2, 0xa3c, 0x80000000, 0x2}, {0x1ff, 0x7fff, 0x1ff, 0xfff}, {0x9, 0x5, 0x5, 0xdde}, {0x8, 0x3, 0x79c, 0xfff}, {0x1, 0xc1, 0x1ff, 0x40}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x20}}, {0x8, 0x6, r17}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0xffff, 0x8, 0x3ff, 0x51}, {0x3ff, 0x8, 0xc0, 0x919}, {0x3, 0x401, 0x3, 0x6}, {0x6, 0x10000, 0x3, 0xfffffffffffffffc}, {0x3, 0x7, 0x1f, 0x9d7}, {0xcba7, 0x100000001, 0x0, 0xfffffffffffffffd}]}}}]}}, {{0x8, 0x1, r18}, {0x250, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff7a0}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xeb}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r23}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r24}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}]}}, {{0x8, 0x1, r26}, {0x12c, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfd}}}]}}, {{0x8, 0x1, r29}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r31}}, {0x8}}}]}}, {{0x8, 0x1, r32}, {0x138, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r33}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8, 0x1, r34}, {0x21c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x66}}, {0x8, 0x6, r35}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r36}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2299}}, {0x8, 0x6, r37}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r38}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x303}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r39}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0xe9c}}, 0x80) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:40 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:40 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000140)=0x100000000) openat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x44) r1 = socket$nl_route(0x10, 0x3, 0x0) pread64(r1, &(0x7f0000000000)=""/14, 0xe, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080)=0x2, 0x4) write$selinux_load(r2, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) 10:24:40 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_setlink={0x34, 0x13, 0x600, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x400, 0x2400}, [@IFLA_EVENT={0x8, 0x2c, 0xffffffff80000000}, @IFLA_ADDRESS={0xc, 0x1, @dev={[], 0x15}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:40 executing program 2: syz_open_dev$binder(&(0x7f00000002c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000300)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000100)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in=@rand_addr=0x2, @in=@empty, 0x4e23, 0x5, 0x4e20, 0xcd, 0xa, 0x20, 0x20, 0x0, r1, r2}, {0x4, 0x3, 0xfff, 0x2, 0x6, 0xce, 0x80000000, 0x6740}, {0x2, 0xe46, 0x4, 0x6}, 0x0, 0x6e6bb0, 0x2, 0x0, 0x2, 0x2}, {{@in6=@mcast1, 0x4d4, 0x33}, 0xa, @in6=@ipv4={[], [], @rand_addr=0xfffffffffffffffd}, 0x3502, 0x4, 0x0, 0x81, 0x0, 0x7f, 0x9}}, 0xe8) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) pipe(&(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 10:24:40 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x400, 0x0) perf_event_open(0x0, r0, 0x3, r1, 0x0) io_setup(0x40000100000003, &(0x7f0000000200)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x44) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={[], 0x1, 0x2, 0xa6, 0x5, 0x1fa2}) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000001600)="6367726f757000eb37060000000000000056b658c45644f25cdd23b0cf470a39cd8c4e7d224d230801f294495c192e766f01651a908edbfb16d692120ba5c1a92d79ae041623c4b7dd983f31142fe323022e112a") mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f00000014c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_subtree(r3, 0x0, 0x2, 0x0) write$cgroup_subtree(r4, 0x0, 0x0) set_robust_list(&(0x7f0000000240)={&(0x7f00000001c0)={&(0x7f00000000c0)}, 0x80000001}, 0x18) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, 0x0, 0x0) getsockname(r3, 0x0, 0x0) ioctl(r3, 0xffffffffffff0c67, 0x0) write$selinux_user(0xffffffffffffffff, 0x0, 0x0) r5 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ptrace$getregs(0xe, r5, 0x7, &(0x7f0000000380)=""/106) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000480)=""/4096) 10:24:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e24, @multicast2}}, 0x9, 0x6, 0x3ff, "c30cd94ecc0dd403f3b71bd4eb0b61e1c690ca4782716f0bea9ac4795449ba95fb7285af36598dc0aa325b42f16a660e6877cce74cfebc92b2c115fba1b778c34252d31709ddcd75877a0d9d35662d1c"}, 0xd8) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000240)={0x1, 0x1, 0x9, 0x3, 0x40}, 0x14) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000200)={0x800, 0x80000000, 0x8b5, 0x2, 0x5, 0x0, 0x3ff, 0x1, 0x4, 0x40000401}) write$selinux_load(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="4ffc7df908001f0053dcbf85f012bebd0b8caef1a76f8fc38b35dd243d35c30202000000696e75780002e8033c000000003c9f01003d8a018341a1da06000000000000004cf62159ebff9bdd9b2ff90a8c27614906d12591a61cd8c8e9fa73c4d042210bf997635ae479be00"], 0x28) 10:24:40 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:40 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_setlink={0x34, 0x13, 0x600, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x400, 0x2400}, [@IFLA_EVENT={0x8, 0x2c, 0xffffffff80000000}, @IFLA_ADDRESS={0xc, 0x1, @dev={[], 0x15}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:40 executing program 2: r0 = socket$inet(0x2, 0x3, 0x32) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0xfffffffffffffd62) r1 = fcntl$dupfd(r0, 0x0, r0) sendmmsg$unix(r1, &(0x7f0000000540), 0x1cbebbb037122db, 0x8000000) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73797a31895e61df89afd9b7382eb79ac996d374b0310fdaa18837c780ec2722488396ade1338940a9f9bfe412e182f888a4b0decf76e8619fc869c7e08bf30464ab31d07572eb4f04bdad9bb5ac9d0efa77f81aac67ef9b57683680a717e61ed06ec6a018ca9c6d412e929ad06d59b400a584e3b1bf2894d25864ce796a3a0ade4815f3f3b91609209059022758ca5cb05b4253ff2d43bba3e3b31f8ee40000000000000000000000000000"], 0xac) getsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000080), &(0x7f00000001c0)=0x4) [ 180.234159] SELinux: policydb magic number 0xf97dfc4f does not match expected magic number 0xf97cff8c 10:24:40 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x10202, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/load\x00', 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x1) writev(r0, &(0x7f0000000480)=[{&(0x7f00000003c0)="b19835a76cdadc1693675c5b8a34a70262b660a917e3dad977f1a22f87d3a064641d30c9", 0x24}, {&(0x7f0000000400)="27d80830ced1416cc6d9192c45e84616bc61082f07c490b02e228fe67feab64474b9977aeb4175b4c4df8a3e73c5c00ea3481a8dbd53532fe5d731ebdbeb27fc15f68ff833fbc13bd5101a99a8bbfd8be8d41b9238", 0x55}], 0x2) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="7b1e5a3b4f12ce8315318f24fec76538545faabd0885e6511aa28fc2dc28d912dfa75ae5889e6948478c5d010aa6625ac7b652a6bead075f0dfa490bf7d0d4f1e05206921617df3dc7726a824de12d93c773131cfa15b008c8ffc229509bda61d06185aae1dc", 0x66}], 0x1) r2 = open(&(0x7f00000004c0)='./file0\x00', 0x2da003, 0x180) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000640)={{0x2, 0x4e24, @empty}, {0x307, @broadcast}, 0x0, {0x2, 0x4e22, @loopback}, 'veth0_to_team\x00'}) write$selinux_load(r1, &(0x7f00000000c0)={0xf97cff8c, 0xfffffd08, 'SE Linux', "76000000004c000006000000070000003c9f000000060000"}, 0xfffffffffffffeaf) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000380)=0x14) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000002c0)=""/156) io_setup(0x4, &(0x7f0000000280)=0x0) io_getevents(r3, 0x722, 0x5, &(0x7f0000000500)=[{}, {}, {}, {}, {}], &(0x7f0000000600)) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x1}, 0x7) 10:24:40 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup2(r0, r0) getsockopt$inet_udp_int(r1, 0x11, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x4) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3ff) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020f090f130000002bbd7000fedbdf2502000100000004d61703cf040100008002000000070019000000000002004e21e000000200000000000000000a004e2001000000ff020000000000000000000000000001010400000000000005001a000000000000000000000000000000000000000000000000000000000000000001000004000100140020000000000000000000000000000000"], 0x98}}, 0x800) syslog(0xf, &(0x7f0000000300)=""/210, 0xd2) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000140)={{}, 'syz1\x00', 0x3}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x15) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000280)={'bcsf0\x00', 0xd31f}) ioctl$UI_DEV_SETUP(r3, 0x5501, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) 10:24:40 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_setlink={0x34, 0x13, 0x600, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x400, 0x2400}, [@IFLA_EVENT={0x8, 0x2c, 0xffffffff80000000}, @IFLA_ADDRESS={0xc, 0x1, @dev={[], 0x15}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) 10:24:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000002540)=@ipx, 0x80, &(0x7f00000049c0)=[{&(0x7f00000025c0)=""/122, 0x7a}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000004740)=""/172, 0xac}, {&(0x7f00000048c0)=""/175, 0xaf}, {&(0x7f0000004980)=""/30, 0x1e}], 0x5, &(0x7f0000004a80)=""/177, 0xb1, 0xffffffff}}], 0x1, 0x2100, &(0x7f0000004bc0)={0x0, 0x989680}) r2 = memfd_create(&(0x7f0000000100)='f2fs\x00', 0x5) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000100000000000000000000000000000000020000000a00000000efff000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0xfffffffffffffd64) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r5 = getuid() setfsuid(0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{}, {}]}) write$P9_RLINK(r4, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000002c0)={{{@in6, @in6=@remote, 0x4e20, 0x4, 0x4e20, 0x0, 0x0, 0x20, 0xa0, 0x3e, 0x0, r5}, {0xfff, 0x0, 0x1, 0x89c5, 0x2, 0x1}, {0x8000, 0x1a32, 0x0, 0xffffffff}, 0x3, 0x0, 0x1, 0x0, 0x2}, {{@in6=@mcast2, 0x4d5, 0xff}, 0x2, @in6=@mcast1, 0x3500, 0x3, 0x1, 0x4, 0x6, 0x9, 0x7f}}, 0xe8) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 10:24:40 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$selinux_context(r1, &(0x7f0000000040)='system_u:object_r:scsi_generic_device_t:s0\x00', 0x2b) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000e35245204c696e757812000000004c0000060000eb060000003c9f000000060000"], 0x28) 10:24:40 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, 0x0, r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:40 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_setlink={0x34, 0x13, 0x600, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x400, 0x2400}, [@IFLA_EVENT={0x8, 0x2c, 0xffffffff80000000}, @IFLA_ADDRESS={0xc, 0x1, @dev={[], 0x15}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) 10:24:41 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 180.577162] sel_write_load: 29 callbacks suppressed [ 180.577166] SELinux: failed to load policy [ 180.596053] SELinux: policydb string length -486539256 does not match expected length 8 [ 180.619853] SELinux: failed to load policy 10:24:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000002540)=@ipx, 0x80, &(0x7f00000049c0)=[{&(0x7f00000025c0)=""/122, 0x7a}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000004740)=""/172, 0xac}, {&(0x7f00000048c0)=""/175, 0xaf}, {&(0x7f0000004980)=""/30, 0x1e}], 0x5, &(0x7f0000004a80)=""/177, 0xb1, 0xffffffff}}], 0x1, 0x2100, &(0x7f0000004bc0)={0x0, 0x989680}) r2 = memfd_create(&(0x7f0000000100)='f2fs\x00', 0x5) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000100000000000000000000000000000000020000000a00000000efff000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0xfffffffffffffd64) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r5 = getuid() setfsuid(0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{}, {}]}) write$P9_RLINK(r4, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000002c0)={{{@in6, @in6=@remote, 0x4e20, 0x4, 0x4e20, 0x0, 0x0, 0x20, 0xa0, 0x3e, 0x0, r5}, {0xfff, 0x0, 0x1, 0x89c5, 0x2, 0x1}, {0x8000, 0x1a32, 0x0, 0xffffffff}, 0x3, 0x0, 0x1, 0x0, 0x2}, {{@in6=@mcast2, 0x4d5, 0xff}, 0x2, @in6=@mcast1, 0x3500, 0x3, 0x1, 0x4, 0x6, 0x9, 0x7f}}, 0xe8) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 10:24:41 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_setlink={0x34, 0x13, 0x600, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x400, 0x2400}, [@IFLA_EVENT={0x8, 0x2c, 0xffffffff80000000}, @IFLA_ADDRESS={0xc, 0x1, @dev={[], 0x15}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) 10:24:41 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() [ 180.716302] SELinux: failed to load policy 10:24:41 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$selinux_load(r0, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x187) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000380)=0x9) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x80, r2, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x122}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x40}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x101}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r0}, {0x8, 0x1, r1}, {0x8, 0x1, r0}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x401}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x800) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000040)) [ 180.822426] SELinux: failed to load policy [ 180.834600] SELinux: failed to load policy 10:24:41 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_setlink={0x34, 0x13, 0x600, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x400, 0x2400}, [@IFLA_EVENT={0x8, 0x2c, 0xffffffff80000000}, @IFLA_ADDRESS={0xc, 0x1, @dev={[], 0x15}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000002540)=@ipx, 0x80, &(0x7f00000049c0)=[{&(0x7f00000025c0)=""/122, 0x7a}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000004740)=""/172, 0xac}, {&(0x7f00000048c0)=""/175, 0xaf}, {&(0x7f0000004980)=""/30, 0x1e}], 0x5, &(0x7f0000004a80)=""/177, 0xb1, 0xffffffff}}], 0x1, 0x2100, &(0x7f0000004bc0)={0x0, 0x989680}) r2 = memfd_create(&(0x7f0000000100)='f2fs\x00', 0x5) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000100000000000000000000000000000000020000000a00000000efff000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0xfffffffffffffd64) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r5 = getuid() setfsuid(0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{}, {}]}) write$P9_RLINK(r4, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000002c0)={{{@in6, @in6=@remote, 0x4e20, 0x4, 0x4e20, 0x0, 0x0, 0x20, 0xa0, 0x3e, 0x0, r5}, {0xfff, 0x0, 0x1, 0x89c5, 0x2, 0x1}, {0x8000, 0x1a32, 0x0, 0xffffffff}, 0x3, 0x0, 0x1, 0x0, 0x2}, {{@in6=@mcast2, 0x4d5, 0xff}, 0x2, @in6=@mcast1, 0x3500, 0x3, 0x1, 0x4, 0x6, 0x9, 0x7f}}, 0xe8) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 10:24:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f0000000040)}, 0x10) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:41 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:41 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:41 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 181.099846] SELinux: failed to load policy 10:24:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x2) 10:24:41 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_setlink={0x34, 0x13, 0x600, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x400, 0x2400}, [@IFLA_EVENT={0x8, 0x2c, 0xffffffff80000000}, @IFLA_ADDRESS={0xc, 0x1, @dev={[], 0x15}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) [ 181.126203] SELinux: failed to load policy 10:24:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000002540)=@ipx, 0x80, &(0x7f00000049c0)=[{&(0x7f00000025c0)=""/122, 0x7a}, {&(0x7f0000002640)=""/4096, 0x1000}, {&(0x7f0000004740)=""/172, 0xac}, {&(0x7f00000048c0)=""/175, 0xaf}, {&(0x7f0000004980)=""/30, 0x1e}], 0x5, &(0x7f0000004a80)=""/177, 0xb1, 0xffffffff}}], 0x1, 0x2100, &(0x7f0000004bc0)={0x0, 0x989680}) r2 = memfd_create(&(0x7f0000000100)='f2fs\x00', 0x5) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000100000000000000000000000000000000020000000a00000000efff000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0xfffffffffffffd64) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r5 = getuid() setfsuid(0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{}, {}]}) write$P9_RLINK(r4, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000002c0)={{{@in6, @in6=@remote, 0x4e20, 0x4, 0x4e20, 0x0, 0x0, 0x20, 0xa0, 0x3e, 0x0, r5}, {0xfff, 0x0, 0x1, 0x89c5, 0x2, 0x1}, {0x8000, 0x1a32, 0x0, 0xffffffff}, 0x3, 0x0, 0x1, 0x0, 0x2}, {{@in6=@mcast2, 0x4d5, 0xff}, 0x2, @in6=@mcast1, 0x3500, 0x3, 0x1, 0x4, 0x6, 0x9, 0x7f}}, 0xe8) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)}) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f00000001c0)) 10:24:41 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:41 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:41 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_setlink={0x34, 0x13, 0x600, 0x70bd27, 0x25dfdbff, {0x7, 0x0, 0x0, r2, 0x400, 0x2400}, [@IFLA_EVENT={0x8, 0x2c, 0xffffffff80000000}, @IFLA_ADDRESS={0xc, 0x1, @dev={[], 0x15}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) [ 181.420451] SELinux: failed to load policy [ 181.476397] SELinux: failed to load policy 10:24:41 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() 10:24:41 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) [ 181.498603] SELinux: failed to load policy 10:24:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x1df, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0xff7e) 10:24:41 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:42 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008b12, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x3, 0x6) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000080)={0x7b113c49, 0x9, 0x7fff}, 0xc) r2 = socket(0xa, 0x1, 0x0) getrandom(&(0x7f00000000c0)=""/79, 0x4f, 0x2) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000001c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0xffffffffffffff06) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x2b, &(0x7f0000000000)={0x80000001}, 0x4) [ 181.708551] SELinux: policydb string length 479 does not match expected length 8 10:24:42 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000000c0)=""/209) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) 10:24:42 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:42 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:42 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() 10:24:42 executing program 5: write$selinux_load(0xffffffffffffffff, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000080)) 10:24:42 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r4 = dup3(r2, r1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000002c0)) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x1, 0x0) eventfd(0x0) 10:24:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812000000004c00000600000007ef00003c9f000000060000"], 0x28) 10:24:42 executing program 5: write$selinux_load(0xffffffffffffffff, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000080)) 10:24:42 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:42 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() 10:24:42 executing program 5: write$selinux_load(0xffffffffffffffff, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000080)) [ 182.118784] SELinux: policydb table sizes (6,61191) do not match mine (6,7) 10:24:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/143, 0x8f) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:42 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:42 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:42 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = dup(r0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000000)="9d3c9eb327afe814745abd6555f8db8c4f49011bc55b45bc9732b32cd4e1af69751d3827aee38c54a601") 10:24:42 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:43 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:43 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYRESHEX=r0], 0x12) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000005345000000004c000006000000070000003c9f000000060000"], 0x28) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000780)='/dev/null\x00', 0x200000, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f00000007c0)=0xfff, 0x4) r2 = dup(r0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000000)={@remote, @rand_addr=0x1}, 0x8) 10:24:43 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) [ 182.761787] SELinux: policydb magic number 0x30307830 does not match expected magic number 0xf97cff8c [ 182.804905] SELinux: policydb string SE does not match my string SE Linux [ 182.836268] SELinux: policydb magic number 0x30307830 does not match expected magic number 0xf97cff8c 10:24:43 executing program 0: socket$inet6(0xa, 0x4, 0x8000) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) poll(&(0x7f0000000000)=[{r0, 0x200}, {r0, 0x80}, {r0, 0x100}, {r0, 0x8040}, {r0, 0x2}, {r0}], 0x6, 0x3) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cffc7f9080000005345204c0200000000000000004c0000060000000f00009e154f2800000000"], 0x28) 10:24:43 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 182.866278] SELinux: policydb string SE does not match my string SE Linux 10:24:43 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) [ 182.982531] SELinux: policydb magic number 0xf9c7ff8c does not match expected magic number 0xf97cff8c 10:24:43 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:43 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 183.222484] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 183.289865] CPU: 1 PID: 7497 Comm: syz-executor5 Not tainted 4.14.86+ #16 [ 183.296823] Call Trace: [ 183.299432] dump_stack+0xb9/0x11b [ 183.302977] warn_alloc.cold.35+0x9d/0x1b7 [ 183.307229] ? zone_watermark_ok_safe+0x240/0x240 [ 183.312092] ? avc_has_perm+0x150/0x390 [ 183.316086] ? lock_downgrade+0x560/0x560 [ 183.320231] ? avc_has_perm+0x9e/0x390 [ 183.324120] ? check_preemption_disabled+0x34/0x1e0 [ 183.329159] __vmalloc_node_range+0x390/0x680 [ 183.333659] ? futex_wake+0x141/0x420 [ 183.337475] ? sel_write_load+0x1b5/0x1000 [ 183.341720] vmalloc+0x63/0x80 [ 183.344943] ? sel_write_load+0x1b5/0x1000 [ 183.349227] sel_write_load+0x1b5/0x1000 [ 183.353312] ? sel_read_bool+0x240/0x240 [ 183.357392] ? __lock_acquire+0x619/0x4320 [ 183.361628] ? kasan_slab_free+0xac/0x190 [ 183.365772] ? kmem_cache_free+0x12d/0x350 [ 183.370060] ? trace_hardirqs_on+0x10/0x10 [ 183.374406] ? __fdget_pos+0xa2/0xc0 [ 183.378154] __vfs_write+0xf4/0x5c0 [ 183.381805] ? sel_read_bool+0x240/0x240 [ 183.385882] ? kernel_read+0x110/0x110 [ 183.389792] ? rcu_read_lock_sched_held+0x102/0x120 [ 183.394810] vfs_write+0x17f/0x4d0 [ 183.398350] SyS_write+0xc2/0x1a0 [ 183.401946] ? SyS_read+0x1a0/0x1a0 [ 183.405568] ? do_clock_gettime+0xb0/0xb0 [ 183.409711] ? do_syscall_64+0x43/0x4b0 [ 183.413691] ? SyS_read+0x1a0/0x1a0 [ 183.417339] do_syscall_64+0x19b/0x4b0 [ 183.421275] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 183.426462] RIP: 0033:0x457569 [ 183.429660] RSP: 002b:00007fea60b07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 10:24:43 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 1: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r1, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000000c0)={0x0, r1/1000+10000}, 0x10) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x1, 0xfffffffffffffffb, 0x8, 0x81}, 0xc) listen(r0, 0xff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) shutdown(r0, 0x1) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) [ 183.437382] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 183.444720] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 183.452000] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 183.459264] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fea60b086d4 [ 183.466512] R13: 00000000004c5c5f R14: 00000000004d9e90 R15: 00000000ffffffff [ 183.478595] warn_alloc_show_mem: 1 callbacks suppressed [ 183.478653] Mem-Info: [ 183.486826] active_anon:98723 inactive_anon:28605 isolated_anon:0 [ 183.486826] active_file:22823 inactive_file:14397 isolated_file:0 [ 183.486826] unevictable:0 dirty:220 writeback:0 unstable:0 [ 183.486826] slab_reclaimable:7515 slab_unreclaimable:56799 [ 183.486826] mapped:55325 shmem:183 pagetables:1777 bounce:0 [ 183.486826] free:1354852 free_pcp:339 free_cma:0 [ 183.521241] Node 0 active_anon:394892kB inactive_anon:114420kB active_file:91292kB inactive_file:57588kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:221300kB dirty:880kB writeback:0kB shmem:732kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 183.545195] DMA32 free:3079672kB min:4792kB low:7868kB high:10944kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:3079672kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 183.572061] lowmem_reserve[]: 0 3437 3437 [ 183.576354] Normal free:2339736kB min:5480kB low:9000kB high:12520kB active_anon:394892kB inactive_anon:114420kB active_file:91292kB inactive_file:57588kB unevictable:0kB writepending:884kB present:4718592kB managed:3521708kB mlocked:0kB kernel_stack:4640kB pagetables:7108kB bounce:0kB free_pcp:1352kB local_pcp:736kB free_cma:0kB [ 183.605783] lowmem_reserve[]: 0 0 0 [ 183.609512] DMA32: 2*4kB (UM) 0*8kB 1*16kB (M) 1*32kB (U) 3*64kB (UM) 2*128kB (UM) 2*256kB (UM) 1*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 750*4096kB (M) = 3079672kB 10:24:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9010001005345204c696e757812000000004c000006000000070040003c9f000000060000"], 0x28) 10:24:44 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) [ 183.624357] Normal: 1954*4kB (UE) 3006*8kB (UM) 2299*16kB (UME) 217*32kB (UME) 206*64kB (UME) 70*128kB (UM) 22*256kB (UM) 12*512kB (UME) 4*1024kB (UM) 3*2048kB (UME) 542*4096kB (M) = 2339784kB [ 183.641836] 37403 total pagecache pages [ 183.645842] 0 pages in swap cache [ 183.649338] Swap cache stats: add 0, delete 0, find 0/0 [ 183.655851] Free swap = 0kB [ 183.659073] Total swap = 0kB [ 183.662517] 1965979 pages RAM [ 183.665771] 0 pages HighMem/MovableOnly [ 183.669898] 315634 pages reserved 10:24:44 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 183.727581] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 183.763619] CPU: 0 PID: 7521 Comm: syz-executor5 Not tainted 4.14.86+ #16 [ 183.770549] Call Trace: [ 183.773136] dump_stack+0xb9/0x11b [ 183.776684] warn_alloc.cold.35+0x9d/0x1b7 [ 183.780926] ? zone_watermark_ok_safe+0x240/0x240 [ 183.785763] ? avc_has_perm+0x150/0x390 [ 183.789730] ? lock_downgrade+0x560/0x560 [ 183.793872] ? avc_has_perm+0x9e/0x390 [ 183.797752] ? check_preemption_disabled+0x34/0x1e0 [ 183.802794] __vmalloc_node_range+0x390/0x680 [ 183.807288] ? futex_wake+0x141/0x420 [ 183.811090] ? sel_write_load+0x1b5/0x1000 [ 183.815312] vmalloc+0x63/0x80 [ 183.818493] ? sel_write_load+0x1b5/0x1000 [ 183.822728] sel_write_load+0x1b5/0x1000 [ 183.826828] ? sel_read_bool+0x240/0x240 [ 183.830875] ? __lock_acquire+0x619/0x4320 [ 183.835120] ? kasan_slab_free+0xac/0x190 [ 183.839253] ? kmem_cache_free+0x12d/0x350 [ 183.843549] ? trace_hardirqs_on+0x10/0x10 [ 183.847797] ? __fdget_pos+0xa2/0xc0 [ 183.851539] __vfs_write+0xf4/0x5c0 [ 183.855168] ? sel_read_bool+0x240/0x240 [ 183.859231] ? kernel_read+0x110/0x110 [ 183.863133] ? rcu_read_lock_sched_held+0x102/0x120 [ 183.868141] vfs_write+0x17f/0x4d0 [ 183.871680] SyS_write+0xc2/0x1a0 [ 183.875136] ? SyS_read+0x1a0/0x1a0 [ 183.878751] ? do_clock_gettime+0xb0/0xb0 [ 183.882907] ? do_syscall_64+0x43/0x4b0 [ 183.886899] ? SyS_read+0x1a0/0x1a0 [ 183.890533] do_syscall_64+0x19b/0x4b0 [ 183.894446] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 183.899624] RIP: 0033:0x457569 [ 183.902807] RSP: 002b:00007fea60b07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 183.910521] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 183.917775] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 10:24:44 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:44 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9e99fa4be361169bee466080000005345203769ffffffff000000004c000006000021070000003c9f00000006000092d8cd77d28ef58ccbf04925ec4c335a99330d8f0a0a5d32af3e9d72b6cee9f4f2a40dae104399ab42da0a953005efb2cbf8"], 0x28) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0xc001, 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000300)) r3 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000480)="cbf4a5af2aa3c39c472c9a56ea8cd1e8242a6adae0f640842330f0b427d771c287496fed9af9244d22f4f1ac9b4b51c806933c09afc86b1c470acf0e546037d3d849ffea5f85d7e8238bb2adf353aabd678215f14c6dc56ddffd9f8a6e9c6418610962eb5393a3eef3e3539f18d3dc464a61ae1f546361a5f4ee5638757ea836cce4bffb29c7e9d600478b2bf1c439effaa48a8d302d184523e363ab0888a538a38fb1e1130a860e3cecd75d8608fdae185aca55df558389024edcf4bfe0fa6232fddb8b3d12e85fb8548b6893ea2da0854d803fcd", 0xd5, 0xfffffffffffffffb) r4 = request_key(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='.dead\x00', 0x0) r5 = add_key(&(0x7f00000001c0)='.dead\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="8cf0b8237ddbe148d5dd416125208de0c29a3ff00bba1c8d87665e", 0x1b, r4) keyctl$link(0x8, r3, r5) 10:24:44 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 183.925038] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 183.932296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fea60b086d4 [ 183.939568] R13: 00000000004c5c5f R14: 00000000004d9e90 R15: 00000000ffffffff [ 183.948316] SELinux: policydb string length 65537 does not match expected length 8 [ 184.089523] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 184.119888] CPU: 1 PID: 7535 Comm: syz-executor5 Not tainted 4.14.86+ #16 [ 184.126820] Call Trace: [ 184.129406] dump_stack+0xb9/0x11b [ 184.132965] warn_alloc.cold.35+0x9d/0x1b7 [ 184.137243] ? zone_watermark_ok_safe+0x240/0x240 [ 184.142097] ? avc_has_perm+0x150/0x390 [ 184.146200] ? lock_downgrade+0x560/0x560 [ 184.150351] ? avc_has_perm+0x9e/0x390 [ 184.154255] ? check_preemption_disabled+0x34/0x1e0 [ 184.159307] __vmalloc_node_range+0x390/0x680 [ 184.163803] ? futex_wake+0x141/0x420 [ 184.167612] ? sel_write_load+0x1b5/0x1000 [ 184.171862] vmalloc+0x63/0x80 [ 184.175050] ? sel_write_load+0x1b5/0x1000 [ 184.179316] sel_write_load+0x1b5/0x1000 [ 184.183399] ? sel_read_bool+0x240/0x240 [ 184.187455] ? __lock_acquire+0x619/0x4320 [ 184.191694] ? kasan_slab_free+0xac/0x190 [ 184.195840] ? kmem_cache_free+0x12d/0x350 [ 184.200091] ? trace_hardirqs_on+0x10/0x10 [ 184.204325] ? __fdget_pos+0xa2/0xc0 [ 184.208081] __vfs_write+0xf4/0x5c0 [ 184.211701] ? sel_read_bool+0x240/0x240 [ 184.215769] ? kernel_read+0x110/0x110 [ 184.219700] ? rcu_read_lock_sched_held+0x102/0x120 [ 184.224734] vfs_write+0x17f/0x4d0 [ 184.228313] SyS_write+0xc2/0x1a0 [ 184.231792] ? SyS_read+0x1a0/0x1a0 [ 184.235420] ? do_clock_gettime+0xb0/0xb0 10:24:44 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:44 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:44 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x100) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f00000000c0)={0xcc, 0x619b027d, 0x1}) write$cgroup_subtree(r0, &(0x7f0000000200)={[{0x2d, 'rdma'}, {0x2b, 'io'}, {0x2d, 'io'}]}, 0xe) prctl$PR_GET_NO_NEW_PRIVS(0x27) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6, 0x1) socket$inet(0x2, 0x6, 0x6) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x5, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x200, 0x9, 0x3, 0x101, 0xa3, 0x0, 0x1004, 0x10000, 0x100}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0) getpeername$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000180)={@loopback, @broadcast, r3}, 0xc) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000280)) [ 184.239577] ? do_syscall_64+0x43/0x4b0 [ 184.243553] ? SyS_read+0x1a0/0x1a0 [ 184.247191] do_syscall_64+0x19b/0x4b0 [ 184.251086] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 184.256292] RIP: 0033:0x457569 [ 184.259498] RSP: 002b:00007fea60b07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 184.267203] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 184.274470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 184.281745] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 10:24:44 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:44 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:44 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 184.289013] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fea60b086d4 [ 184.296303] R13: 00000000004c5c5f R14: 00000000004d9e90 R15: 00000000ffffffff [ 184.329437] SELinux: policydb string length -1096507415 does not match expected length 8 10:24:44 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000003c0)=0x68) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) [ 184.345953] SELinux: policydb string length -1096507415 does not match expected length 8 10:24:44 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x100, 0x4f2, 0x5, 0x40, 0x80000000, 0xfffffffffffffd35, 0x2, 0x0, 0x2, 0x7}) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x158, 0x29, 0x0, 0x70bd25, 0x25dfdbfd, {0xb}, [@typed={0x8, 0x12, @uid=r1}, @typed={0x1c, 0x29, @binary="d259d936ea5e6b103cc5559ba65745cad01d4ec85c"}, @typed={0x14, 0x90, @str='/selinux/load\x00'}, @generic="66ca22fcf09f737681bda4b5fa57c2a2cf93969d027ab5bbcdd2402597f2f87452369410ee13843fd45706cca344cfbf99bfe3c1", @generic="0aaccedaef4a5c938460987a3fb30556519bddca065af3e83470463421fb1358a49f453299df6d134e246dcb2ad69aa0215e641d7aba7dce91fb985686b1d5fc04ee2b1de2c06e1772bbee4196e6eb552121268ed712217734836983dcd22e12fc807dce19bed81ea384831acc82da8531889cfddc2f5ec6d2811ba3a1259063b7288ed1448c88569ae9d589b89d044f7fd1d1d6837e754aeb5c4f0ce1d48b128286b2a2d47509eb03d7aa5d83a40f8a8175fa7b748bb527ee016f23bf998aa6943648027e245891d7527dec0ce15e4898c22c40142f"]}, 0x158}, 0x1, 0x0, 0x0, 0x4050}, 0x40080) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9180000005345204c696e75781203520df7a42f4c00000000009f07c8f500000000000000008c46ca2a07a6eb46ca93f0f87591ee"], 0x28) 10:24:44 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f00000003c0)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:44 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf9e99fa4be361169bee466080000005345203769ffffffff000000004c000006000021070000003c9f00000006000092d8cd77d28ef58ccbf04925ec4c335a99330d8f0a0a5d32af3e9d72b6cee9f4f2a40dae104399ab42da0a953005efb2cbf8"], 0x28) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0xc001, 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000300)) r3 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000480)="cbf4a5af2aa3c39c472c9a56ea8cd1e8242a6adae0f640842330f0b427d771c287496fed9af9244d22f4f1ac9b4b51c806933c09afc86b1c470acf0e546037d3d849ffea5f85d7e8238bb2adf353aabd678215f14c6dc56ddffd9f8a6e9c6418610962eb5393a3eef3e3539f18d3dc464a61ae1f546361a5f4ee5638757ea836cce4bffb29c7e9d600478b2bf1c439effaa48a8d302d184523e363ab0888a538a38fb1e1130a860e3cecd75d8608fdae185aca55df558389024edcf4bfe0fa6232fddb8b3d12e85fb8548b6893ea2da0854d803fcd", 0xd5, 0xfffffffffffffffb) r4 = request_key(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)='.dead\x00', 0x0) r5 = add_key(&(0x7f00000001c0)='.dead\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="8cf0b8237ddbe148d5dd416125208de0c29a3ff00bba1c8d87665e", 0x1b, r4) keyctl$link(0x8, r3, r5) 10:24:44 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r1, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:44 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x22, 0xfffffffffffffffe, 0x247) fcntl$setstatus(r0, 0x4, 0x0) 10:24:44 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 10:24:44 executing program 0: lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:mount_tmp_t:s0\x00', 0x21, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x198, 0x161000) fcntl$dupfd(r0, 0x0, r1) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/140, 0x8c}, {&(0x7f0000002380)=""/210, 0xd2}], 0x3, 0x0) write$selinux_load(r2, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) [ 184.594307] SELinux: policydb string length 24 does not match expected length 8 10:24:45 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r1, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000080)) 10:24:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x820, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000007000/0x1000)=nil, 0x1000) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) personality(0x410000f) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) r1 = dup3(r0, r0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a80)='IPVS\x00') setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x4e21, 0xfffffffffffffeff, @loopback, 0x1f}}, 0x80000001, 0x1, 0xfffffffffffffffd, "90a1100772fc49176ff4d5861c3bd38ead1955937a85a0e3429eefee1d9dc8dfdb5226a827e8d1b7c674d18e8b1f4d2ee3b4f5d39592f504abb20bb52936bc13524f12851c8a94b9db2e3815e18f0c98"}, 0xd8) ftruncate(0xffffffffffffffff, 0x0) flock(r1, 0x4) set_thread_area(&(0x7f00000006c0)={0x0, 0x20000800, 0x0, 0x0, 0x83, 0x4, 0x6, 0x1, 0x3}) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000200)={0x5, &(0x7f0000000180)=[{0x8, 0x2}, {0x8, 0x200}, {0x100, 0x14}, {0x7f, 0x5}, {0x242e, 0x200001}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) fallocate(r0, 0x48, 0x5, 0xfffffffffffffff9) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000640)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000001c0)='nv\x00', 0xfffffffffffffcee) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xb3) ioctl$KDSETLED(r1, 0x4b32, 0xfffffffffffffffd) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000023c0)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000024c0)=0xe8) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000680)={0x3}, 0x4) r3 = request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='syz', 0xfffffffffffffffa) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb, 0x77, 0x1, 0x4}, 0xffffffffffffff1f) request_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee100", r3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) dup3(r2, r2, 0x80000) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="d13ff3d776", 0x0) 10:24:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:45 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:45 executing program 2: mkdir(&(0x7f000002b000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x4040, 0x0) r0 = creat(&(0x7f0000002500)='./file0/bus\x00', 0xcebb6074bb566d03) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000400) r2 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) fcntl$lock(r2, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xe141}) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000100)=ANY=[]) recvfrom$inet(r0, &(0x7f0000000000)=""/64, 0x40, 0x40000002, &(0x7f0000000080)={0x2, 0x4e22, @broadcast}, 0x10) 10:24:45 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r1, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$VT_RELDISP(r4, 0x5605) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) getgroups(0x2, &(0x7f0000000100)=[0xffffffffffffffff, 0xee01]) chown(&(0x7f0000000000)='./file0\x00', r2, r5) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080200005345124c696e7578"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) tkill(r1, 0x1d) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x800, 0x0) 10:24:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c686e757812000000004c000006000000070000003c9f000000060000"], 0x25) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x40, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000100)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x2c0) 10:24:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = getpgrp(0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x6, 0x80, 0xffffffffffffffff, 0x437, 0x0, 0x8, 0x10011, 0x6, 0x5, 0x18, 0xb705, 0x5, 0x101, 0x1f, 0xe5, 0x44a6, 0x9, 0x100, 0x3, 0x7, 0x4, 0x2, 0xff, 0x5cca4fa0, 0x1, 0x2, 0x3, 0x4, 0x2, 0x1, 0x9, 0x3, 0x10001, 0x9, 0x5, 0xffff, 0x0, 0x7, 0x7, @perf_config_ext={0x800, 0x7}, 0x10002, 0x100000000, 0x80, 0x2, 0x5, 0x7, 0x5}, r1, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_pts(r0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000008, 0x10, r2, 0x5) read(r2, &(0x7f0000000280)=""/1, 0xfffffece) syncfs(r2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') close(r2) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1010, r3, 0x0) sched_setparam(r1, &(0x7f0000000200)=0x2) close(r3) 10:24:45 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000000)='cpusetselinuxppp1GPL\x00'}, 0x30) sched_setparam(r1, &(0x7f0000000100)=0x7ff) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x2, 0xb, 0x0, 0x8, 0x2}, 0x10}}, 0x0) 10:24:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) [ 185.232888] SELinux: policydb string SE Lhnux does not match my string SE Linux [ 185.247330] audit: type=1400 audit(1544091885.589:43): avc: denied { map } for pid=7635 comm="syz-executor4" path="pipe:[20166]" dev="pipefs" ino=20166 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 10:24:45 executing program 0: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812000000000600000000000000000000"], 0x28) [ 185.296149] SELinux: policydb string SE Lhnux does not match my string SE Linux 10:24:45 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) socket$netlink(0x10, 0x3, 0x9) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780daf487e0f6076e38a95ed44a5edb4ff0a51fe892a5faa5df0eab568c833018c00886b9c8ecc8b7f0d8e8879a33e6fc9f1a1ad70fc6f5b13679450b23de27335d5a06df5f961b9f8dad2f0fe1ef8b5b29ed5a13ae80924a6c5fc53207c5cf43121351ccd4c4c801812bfca895f34e8ee12ec0f7e29713cb5d288389d008ea3311f1b3c64556ca3a7d1fdb5d4024c9238390e8ead625dd2f50510969efc5c756573cb43c47267a46b4d"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@nl=@proc, &(0x7f0000000080)=0x80) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000100)={0x100, {{0x2, 0x4e22, @multicast2}}}, 0x88) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = dup2(r0, r0) setsockopt$inet6_buf(r1, 0x29, 0x1deceb9ccd46fa9b, &(0x7f0000000000)="bac528dc5a82af499aeb6b38efe8c3df1b841403009c5122981b7634267d435ff54b9486c2da629b4a2b5ceb20aa8c3532ddcf14e1e49e4a581c3bf3bd7beeca2e98d6a3f0c0fc7607ef946739adffa02a2f1909bfc448c6edbd09265e91e5ee5ea542ec0bd81c082219df7ad757b269db3442f408170e67e8450e6fe325a8bbd851156e823ad2360e3c74954cdd", 0x8e) [ 185.422617] SELinux: policydb table sizes (0,0) do not match mine (6,7) 10:24:45 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x28) 10:24:46 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8000, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000040)=""/75) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 10:24:46 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:46 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c576e7578"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) epoll_create1(0x80000) epoll_create1(0x80000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000040)='./file0\x00', 0x200) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) [ 185.903128] SELinux: policydb string length 1964769416 does not match expected length 8 [ 185.926792] sel_write_load: 33 callbacks suppressed [ 185.926797] SELinux: failed to load policy 10:24:46 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 186.048528] SELinux: failed to load policy 10:24:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x2, 0x0) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000240)={0xff, 0x4, 0xb00e, 0x201000}) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r4 = accept(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x80) fcntl$getflags(r1, 0x408) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000180)) 10:24:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812000000f9ffffffffffffff070000003c9f0000000600004d912260e7d0ae9137388702a87cebfba35e05a6eaab001fa82671205fffd714ac3f7268e7b0833d77e8df1e9f04d724062c33307de539c8ec5303782411bcf5823a2566a7b9da692749affb1a31c9f6e6301eb8479bbb2089af956e117ffd"], 0x28) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) 10:24:46 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000140)="084cc0637fa5cefdae043b04d5f93c79e6fbc859e9567b29c5513d5c997f1a78ef7288f98dd03d0fc883addf718d5dfdd2e0661af19317da1518acaedb9f866e1d8a12ed66d64f28195d9d6b002a9eaa71c9673dd2d551ec7c73825023a16e1f878771f4500d34ed75842d0b10dbe7e872fae9b80160d7e8e9f3c17741f1", 0x7e) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f0000000080)='systemmime_type\x00', 0x10, 0x2) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:46 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 186.176629] SELinux: security policydb version 18 (MLS) not backwards compatible [ 186.208485] SELinux: failed to load policy [ 186.214577] SELinux: security policydb version 18 (MLS) not backwards compatible 10:24:46 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYRES16=r0], 0x2) memfd_create(&(0x7f0000000000)='/selinux/load\x00', 0x4) [ 186.230332] SELinux: failed to load policy 10:24:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xa00, 0x11) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/selinux/load\x00') arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) write$selinux_load(r1, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000001c0)={0x6, 0x9, 0x1, 0x4, 0x0, 0x5, 0x1, 0x200, 0x10000, 0x8001}) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x5, 0x1}]}, 0xc, 0x3) write$selinux_load(r0, &(0x7f00000002c0)={0xf97cff8c, 0x8, 'SE Linux', "aca289acb0eb4d8bbde86653c45820341a851ef3e5f3e9992c5f46af8df8e6b54cb10289bd23e2378ea19687b640ee0557bfcfbec1cd36708a5b9b38be444e3f55f1e4742d3e67dcbc3dc6add0e81369c52481ac635db42d8ff389d7e37ad56e984b2951900ec7cec019c2626236fcfce426cba3a25f6ecb95fa88cf2b6c202ee30dcb75586c4f75a30bd4b3c3bd2716b066c4b3f25c4b69391e4bac3e1c2c82f21e2ef20bed0c19db3c1365283c0f9791875999a8aacf56db94c65586fedc9d360097222584f5b4a96c758952a3eadffe28b388b68f30509e834f97ed1a21c9063ecdbb43d7622d9373cd8a61bf06d1fc9b57"}, 0x103) mknodat(r0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x8000) 10:24:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00') write$input_event(r0, &(0x7f0000000040)={{}, 0x0, 0xffffffffffffffff, 0xe00000}, 0x18) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x802) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) [ 186.295101] SELinux: failed to load policy [ 186.305877] SELinux: failed to load policy 10:24:46 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:46 executing program 5: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c686e757812000000004c000006000000070000003c9f000000060000"], 0x25) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x40, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000100)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x2c0) 10:24:46 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:46 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x900, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) write$selinux_load(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908000000e85a5a490cc43b5345204c696e7578"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) [ 186.605866] SELinux: policydb string SE Lhnux does not match my string SE Linux [ 186.629737] SELinux: failed to load policy [ 186.639263] SELinux: failed to load policy 10:24:47 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cc1996205fad40000000000006e757839c0b7dde5d9e022fcfe847274c1532ca01985e865a2526cf0c1d19bffb7b5f1bb4728"], 0xffffff5c) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm, @window={0x3, 0xb683}, @window={0x3, 0x6, 0xfffffffffffffff8}, @mss={0x2, 0x1}], 0x4) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) [ 186.654508] SELinux: failed to load policy 10:24:47 executing program 0: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) getgroups(0x2, &(0x7f0000000080)=[0xee00, 0x0]) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="08ffffff7d020000005f00050004000000460200000003000000000000000000091000040000f7ffffff57090000000000000e002f73656c696e75782f6c6f6164000e002f73656c696e75782f6c6f6164000e002f73656c696e75782f6c6f616402ac002f8508005345204c696e7578", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x7c) 10:24:47 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 2: write$selinux_load(0xffffffffffffffff, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000080)=0x1c) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$VT_DISALLOCATE(r1, 0x5608) set_tid_address(&(0x7f0000000000)) 10:24:47 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 187.122513] SELinux: failed to load policy 10:24:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) sched_setparam(r1, &(0x7f0000000140)=0x1) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000100)) 10:24:47 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) tee(r0, r0, 0x9, 0x3) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDENABIO(r1, 0x4b36) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) 10:24:47 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e0fb62000c406c53af361f"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) write$selinux_load(r0, &(0x7f0000000100)={0xf97cff8c, 0x8, 'SE Linux', "4bbff2f797afba6fb3ffbd70cd5f2561934038ac4ed40ff21c6976813fe95cd6b2e4109316a0dea5b8dcf6f11189dec521e9326628fa65b7128e01ad00868cfc9bf5265751a759e8362807099ddfb9fa552f805b3514ddd685d1c2cdc430f36a843d05db551efd58c06a05e2b646696e3f0a70d21057e6f3325ecd25effaf553bc08be7d4f0d8d532b89c5d5b308fd7b370aebf6a9286725c301ed63f373c1a3b8208f7cc06243aaf3f718704bf1af5eaa6194dd072ef88e81e5d21d7c55a24ea883c2961cd1eb"}, 0xd7) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/4\x00') bind$unix(r1, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r2 = getpid() stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000b00)=[0x0]) r5 = getpgid(0x0) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() r8 = getpgrp(0xffffffffffffffff) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)=0x0) sendmsg$unix(r1, &(0x7f0000000e80)={&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000980)=[{&(0x7f00000002c0)="9c648c84756d9424e93436e4c78659bb985546be8bed1af9e4390f2dad6dad81d3f1ac2cd271795f94afc54092c38022659a5b7da080a101d79858a2822a171c6b6c740f6810a8a7559dd750668346a76363928121e2c88f268c6b3e8ee246d1ab12944be4b58b924d61447ed95a7d06c37e0e72b24c824516eae8755305ba47956cde7a", 0x84}, {&(0x7f0000000380)="5d7a3b50d59ee909db68db82b36d9fb7c88335e6331042f53e2dd8525a1569922a43ad5e2297cb4e76c0fb8b92f7f4067c575c4a9f809cdb6676a0b60477ed978583867f2213b7815f221aa8b30bd9786691", 0x52}, {&(0x7f0000000400)="733189cfdb713e923a3e467d769cc8bc3c226f1a0d39404dc5cd93f214aa871648f122200239961ed2c03e3227d89dfa80d8f41bbed9f54b36bc700f7e19fcb003303ff11122a2ccd820ec4a2bde711382dfe6c99230570af01b83d327e06eb8382a733b92199a18ee6de0c7636ad8904ed0fe270f87d5ea91a8f9057d0882e7e37d24244c1c3f8973336ca65548759da5b7ddac89bea196f8e43b178fe9566ad52b01d6effaa6167c4f2c3b3f6c1a69d08819971d1a3da1471b9146c8ff7955b1f40706332845879524e52137c33f57062099db325f36207f0463887dffb51d9fe6d9dbcaec855067abfd03f78e66359529c4428c39a2", 0xf7}, {&(0x7f0000000500)="6158293ba60f9fd31ac5091512c12457cb28c53cedefd47a60815d5c5711afb794e8cb1f1f8a5258f45ac7c645873f1d680f160fbf58240ac039d815460a8185c8b3ea51d9d1a9c165157de100f805d2bb74eaaf30ae1ce4113a7a11f378d7dd3d2d69ae9d2d971bd2bd35", 0x6b}, {&(0x7f0000000580)="f594860505a2e9e3e74187bee6d5aa4732769fa4a533d63075e3549a8b9b0c4b5825cce339b4ec496d3d38bc7a92daca768d2d50e06476220b5239b09e35ea73087144d0c6552ae92e564e67714a7747971e5103d3970e9c93e7a58503922aa5b1efc3e6e49f4fdfd9f79b6b6ac5a9676a5eb40cada202ce3a4df144eec7ab1ad50b97b1eac27d8f771ded9c5ad95f389de9f014eee003b93b50715aae6ab3f903bbc8db947a1145f8a8af82a08cc88060db204e5eac70fd31cab98d59b0b76c7b42e1d79629", 0xc6}, {&(0x7f0000000680)="a1ceb45652583d7c4699c06b60ae40f4007036da8e1abef7190b4c396973ed892b20873025940cd27e394d0045a6a4e0a6b4edabb9a42eb61e5ab3c9326ad9500636e0f67604cc9389879aaf8db931d5096289f77c", 0x55}, {&(0x7f0000000700)}, {&(0x7f0000000740)="7d422e560969fe137480e74307c8344bfc3664f07aac2e49de1c5fb2ea62d8582f5177f802f21ccbe1f540da8f8c456bb0350d6213a291e0810c6266b578e5b46dac285d6d920fb40dd97cbc4eabf440ee6687335dfd1ce887a94e1c9ad60509552240a78617fa7b028f5ea3ff1122269a412d52ba79f4dc9601f0dc88c9242f800949d44254e78f75ec0bfb15940290da0dd0c23a00afe2aae6135ea546fc58129e03771dcba5ebed90d03771decb5fd64b47e19d2e7d99a1dba3c0e8794a914ed295446ab9", 0xc6}, {&(0x7f0000000840)="7d32822958713488e07912c1a3f02a9c42e7b8639da7fe89ed347b1e4027114903cb54e54a0625d3e9bcbd314460fda73cfd44e9fc989da96ee5dd3b95433a9f3e877601d02493175614d8186e7e7cf57479ed16c33d1ffb2de581d48be7a95bd294378f28904206cd7f0e13d4af52", 0x6f}, {&(0x7f00000008c0)="356f15924a0e9918f5a49a6077b62b5394dc551c8ae844dd9d40c22c9a501924d5e21b8e2ef5dbaff57095b9967b6174c5aac727e56dcb454bfabfc798b0ed02671543e1e97bc42a5ba908e166260e4887fad9ccf8c78ea6dcbbe7daea219f92bdead87be63029eda9b9d66b19a8534e7ebc5953a9fa146c3dc40f0f93b398aba642098fb52154dbbefe8bcad772001440a9d98d3971528bd194db13f1672377353df23405ae992671bb702591b664c3489483ec05abf9ea6546d7cd", 0xbc}], 0xa, &(0x7f0000000d80)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r1, r0, r0]}, @rights={0x20, 0x1, 0x1, [r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x18, 0x1, 0x1, [r0]}], 0xf8, 0x8010}, 0x0) alarm(0x1) 10:24:47 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x100) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x0, 0x6, 0x8000, 0x6f}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000340)=0x4) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xff60}, 0xe3c7) r3 = getegid() ioctl$TUNSETGROUP(r2, 0x400454ce, r3) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000540)) fcntl$setstatus(r4, 0x4, 0x6100) fdatasync(r2) llistxattr(0x0, 0x0, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6553868c1ab5ab39db3eef8c2ff04f75e68fe9e6677ce966258c9d59cec3d26538173473b1c910699d4f025971d39facfcfa702f119d65d4674c654284d24e8021239a3f354ad8d2"], 0x0, &(0x7f00000001c0)='gfs2meta\x00', 0x2000000, &(0x7f00000002c0)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e333265300") syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) accept4(0xffffffffffffffff, &(0x7f00000004c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) getsockopt$inet6_opts(r4, 0x29, 0x39, &(0x7f0000000380)=""/92, &(0x7f0000000400)=0x5c) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0xfffffffffffffffd) preadv(r2, &(0x7f00000006c0)=[{&(0x7f0000000600)=""/186, 0xba}], 0x1, 0x0) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) ioctl$int_out(r5, 0x2, &(0x7f0000000000)) 10:24:47 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:47 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast1, 0x7d, r1}) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:47 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) fcntl$lock(r0, 0x7, &(0x7f00000004c0)={0x1, 0x3, 0x7d2b, 0xfffffffffffffc00, r1}) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000500)=0x57) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000080)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in=@empty, 0x4e22, 0x400, 0x4e21, 0x80, 0x2, 0x80, 0x20, 0x29, r3, r4}, {0x100000001, 0x800, 0x3ff, 0x7fff, 0x7, 0x80, 0x6, 0x1}, {0x4bb592f, 0x9, 0x61, 0x24000000}, 0x32, 0x6e6bb8, 0x1, 0x1, 0x3, 0x3}, {{@in=@loopback, 0x4d5, 0x6c}, 0x2, @in=@loopback, 0x0, 0x0, 0x1, 0x8, 0x8001, 0x3f}}, 0xe8) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x2d) 10:24:48 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf90807002fdbb40c7a589e2878"], 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x125) 10:24:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e20, @multicast2}, {0x1, @local}, 0x7a, {0x2, 0x4e21, @local}, 'rose0\x00'}) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x3, r2, 0x1d28) 10:24:48 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000696e00000000000000"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="c3e3438cd90d2b975c5c8cff7cf90800"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:48 executing program 0: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000100)=""/214, 0xd6) socketpair(0x10, 0x6, 0x2000000000, &(0x7f0000000340)={0xffffffffffffffff}) write$P9_RVERSION(r0, &(0x7f0000000380)={0x13, 0x65, 0xffff, 0x1, 0x6, '9P2000'}, 0x13) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x42082, 0x0) recvfrom$inet(r1, &(0x7f00000002c0)=""/88, 0x58, 0x2000, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) write$selinux_load(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812000000004c008006000000070000003c9fe680042623d2ba2e40ef7a88f274e6abe9e8bbd33339f5b8d23adda26075ed566149e22428803acc46b5807d300980dac6641bfc2f1b895ea47578db25c93ca01519dd5cb2aef6381c5024911cf0698d279ab0479b0f07ebaf7b02614bb0e1c8c19e6e031e103004c41cf41f"], 0x28) 10:24:48 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:48 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) preadv(r0, &(0x7f00000018c0)=[{&(0x7f0000000480)=""/103, 0x67}, {&(0x7f0000000500)=""/18, 0x12}, {&(0x7f0000000540)=""/203, 0xcb}, {&(0x7f0000000640)=""/32, 0x20}, {&(0x7f0000000680)=""/49, 0x31}, {&(0x7f00000006c0)=""/154, 0x9a}, {&(0x7f0000000780)=""/87, 0x57}, {&(0x7f0000000800)=""/133, 0x85}, {&(0x7f00000008c0)=""/4096, 0x1000}], 0x9, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0xffffff4e) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x4000, 0x0) 10:24:48 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e23, @remote}, {0x2, 0x0, @loopback}, 0x0, 0x100000000, 0x804, 0x2, 0x0, 0x0, 0x9, 0x2, 0x9b}) unshare(0x400) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:49 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000100)=0x0) r2 = getpgid(r1) syz_open_procfs$namespace(r2, &(0x7f00000001c0)='ns/cgroup\x00') write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) 10:24:49 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 0: write$selinux_load(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="8cff7cf9081300005345204c696e757812000000004c000006000000070000003c9f0000000600cecc2e00a3bf8d1a377f15da8c2685ac22ddab09b5f49f287a5bb54ae23de0a9f25667b22b70d8f253c22c33e1f9d708ca0c7b4d2f9671db60dae1ac2bd4c954458e3eef723d20fa06bf44bac63fd2b96199cfe5b7a347f5ab68d8735cd1357a5c9294970994e154c7908440e01788ab49c0aff7a7d980ebf77ed87fa06026f0462dcba8c413008c8aa97a9fc805ea713f727385206712900000a515dcb9410639e70df83af31f41849051440a0e53d76b7822c1ee2107f950e6fbaad30d28019012801dfea5ec4c46c9389ac2be7028772e0be54892"], 0x28) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x84000) fsetxattr$security_capability(r0, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0xffffffffffffff81, 0x8}]}, 0xc, 0x2) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x10000, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0xffff}) write$P9_RMKNOD(r1, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x20, 0x4, 0x2}}, 0x14) signalfd(r1, &(0x7f00000000c0)={0x7fffffff}, 0x8) 10:24:49 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="30f0846cad3fac14c58cff00000000"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x224000, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000040)=0xe8) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000080)={'bond_slave_0\x00', 0x4}) 10:24:49 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff000000004c000006000000070000003c3f489f000000060000"], 0x28) 10:24:49 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x1000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cb0ddd7b4fa6209000a1e9e61f6"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000000)) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:49 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10) r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x14, 0x80000) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000400)={0x2, 0x3, 0x0, 0x7, 0x5}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x218040, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x400000, 0x180) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0x0, 0x0) memfd_create(&(0x7f0000000440)='\x00', 0x5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x81, 0x0) socket(0x10, 0x80806, 0x3e) r5 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x80, 0xb7448db794e65149) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000000580)=""/244) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000480)={0xe, 0x4, 0x10, 0x7, 0x3, 0x7f, 0x3, 0xea}) getsockopt$IP_VS_SO_GET_SERVICE(r6, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000340)=0xccd) fsetxattr$security_capability(r5, &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v1={0x1000000, [{0x1, 0x5}]}, 0xc, 0x1) 10:24:49 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = getpid() setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000002a40), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000002700)=0xe8) getgroups(0x2, &(0x7f0000002740)=[0x0, 0xee00]) r4 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000002780)=0x0, &(0x7f00000027c0), &(0x7f0000002800)) r6 = getgid() r7 = getpgid(0xffffffffffffffff) r8 = geteuid() lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002540)=[{&(0x7f0000000100)="4cb00cc7d2f004d054ad72b3d148c7bddcee5f3ea249b72678ef875d876af079cf50498b31ed04e3ff5d2d7065ba7e6cf9ad27bb5143cc953c968949b9efe14384ad1b4ab2d542fb036e07e42723f45ea855715b8d4323f9dc15d54e56ee888e265d9bfcb163665c2cac4c392a8e07e542ddef6172e1657e020b2d7f44a150f9f77c0d154f11b30eb88291359d7fd8334a3a939f1797b190fbc5ed1a540dbdbdccab1e30a29f85881c89", 0xaa}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="d32d79f5ab07a096fcd6f92c267ae5c11d323881c8f024a5cf393a793f41cf5dddf4d3fa950fff68c2328a1e7c756a55c2dc85b14f14f25acd14d1a3475c829c0821982b3af0b7b43e2c0d5686bf4ab2f8636410e22eddb6176c5d5cba566ec77c570a59196f3898a1d83f3224309533a25a1666174a8ec2f06cd197ee61327236bccb828da5d45754eeb6b784854f1a9b4856598e531116c37a7f05b239e10f352ea305a5e2138c0d760ef41b70136ee473bbd00b0164e3f1221b70ac535f00f4e411a7e1539ca4bdeaeb6a2c0206dfb30ec98383", 0xd5}, {&(0x7f00000001c0)="c6fd6371c1f8d95e257d63cf2613713721ec694d97abfc4de489f060cf8e746cf72a255adb8369ccd5b9339d921b3522c2c0b6900a02d78f58b9cc7d3da9c8d70f3d5a6abe115559cbb65a6809f6c04f6835b7d652c7b1354ecb87d68a170bfb7c36e474d9f08099678ae44bc0", 0x6d}, {&(0x7f00000013c0)="105a6649c970dfd3acc599d47c342f1c8907ec0aa420f303935dc65c683a8209ea74591e40a4ce9a8313686b3b5fd8e5c782a7625a56240d3b80e429af303fd4eca8a959bf76955f", 0x48}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000000240)="c5c9f32ad65eb3f9c8b8550e0fbe5d9c54b02710937b1d27f21449e045df3c9b84fd7e40783d2e53361bb382fd2f1adae8f002dea9f7d68c480248636c", 0x3d}, {&(0x7f0000002440)="9dd507e61cb1838b15abc390609ec0b7f0ad021f3293535587947d03d936680b51b8338b5281cf4cf8f44d356a697e70fcd0caaebdc0cf92d4decf15b5b6773ccda120fcdca1876cae02e677c396a0", 0x4f}, {&(0x7f00000024c0)="e281e9c922d208c372ebfc99ecb3f16a655c812e11630aa443f34b3b13dbb17c29ca379698557a56551bc9f2c8952c4b784fdae7f29c3ceb134eb286d6400d2f0e6a8b35e20dfb09b9e36247319848644695601e03b01baa6ccfcb40", 0x5c}], 0x9, &(0x7f0000002900)=[@rights={0x10}, @cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}], 0xd8, 0x4000000}, 0x40000) keyctl$session_to_parent(0x12) [ 189.484472] SELinux: policydb magic number 0xff8c does not match expected magic number 0xf97cff8c 10:24:50 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:50 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:50 executing program 2: write$selinux_load(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="75785b49476eaed3a5d15aa8392c72080000000000000000ff000000f383a0084600"], 0x207) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@un=@abs, &(0x7f0000000100)=0x80) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000140)=0x2, 0x4) setitimer(0x1, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)={'syz1', "4ca02f297a3ce2ef4b2042a2fd0412fdd23ebbe345d70735073bf2c7b7ae1d561dd4dbfd7ef71a759f191bab73a9b153f1fdeab8471c00688b23fc3998e53bbc71ea641469216c9e60bb5e69febde7b10cdb45c0792995edeea8fcf95b443a790b2f199bc3bad8f37ea42f89f670fcf97fa80422b8655e25a855a9e534795364e63de8d92e8d93233078366d16d3f6df08a74d53dd59f0534d0948ac9183a3bbf40c37226ccbc5ebbf09659363d1751f4b0f8e2ebd3dbce86b31363eb231053d6ec6ca684396e968242399a0d872ca43deb238e7076f44df9729d1c9d9c88728fd55d62e5a34680b"}, 0xec) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:50 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:50 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:50 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:50 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001200)="6d61707300c9fbb504c74c35b6311087f02cd4880df1300782833b67dde646aad544c7a5296ab85e0dd1be4626dcbc2ee9f4b7616d1f1aeaeba74e69765e637ce79ccb0b28495893a225a0f6539540505f0461087e3cad637e13") exit(0x80000000000003f) accept4(r0, 0x0, &(0x7f0000000080), 0x80000) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x33a, 0x4a) init_module(&(0x7f0000001100)='\x00', 0x1, &(0x7f0000001140)="73656c696e75787baf00") ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x700000000000000, 0xcd, 0x1, 0x0, 0x3}) 10:24:50 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "08e6410cee311d46cbc719a189af2ea1cc3a17f3818d8030e21b56d9f92eb8e745b3ab7700713159f11b122c9348991dae345e0cdc7af5acf41c6d5165051f07823963b1008b8959bed9a27969baadf0d00bea59331d7ab76f64b72302e700d32aa6ff3625907a55afc331bcfae4575c25ace131dc067ea7"}, 0x88) 10:24:50 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000580)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = timerfd_create(0x0, 0x80000) read(r0, &(0x7f0000000580)=""/250, 0xfa) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x10d) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000480)="d94d9dab17faa6a67c2dc222167104023053a2f3cfef39eea8ec0acc3d3bb520105a081803279bc6c8ff034d33364b38ce4919c7892e61654e16c2e3145bf79be95aa9c8eed0178214b546c110c0e64161a39fdf5c57450e952a1ea1bc0a9350abe6477ad46572ff197ea7fd6138f8cbacf50c060cd316b73c09cd3015c312c2b688f1f6eb4be17d2e5659a63bf69bfb162769477f7e8363c47e6279aa5064263f5e54cb01e9775c84db628cbca8", 0xae) r2 = getpgid(0xffffffffffffffff) ioprio_get$pid(0x0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x102ffd, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000040)=0x78010e08, 0x8001) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000000080)=0xe8) ioprio_set$uid(0x3, r6, 0x2) unshare(0x0) link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ustat(0x6, &(0x7f0000000680)) add_key$keyring(&(0x7f0000000d40)='keyring\x00', &(0x7f0000000d80), 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000dc0)='user\x00', &(0x7f0000000e00), &(0x7f0000000e40), 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000f00)='encrypted\x00', &(0x7f0000000f40), &(0x7f0000000f80)='trusted\x00', 0xfffffffffffffffc) ioctl$BLKROSET(r3, 0x125d, &(0x7f00000000c0)=0x5) ftruncate(0xffffffffffffffff, 0x0) [ 189.866291] SELinux: policydb magic number 0x317a7973 does not match expected magic number 0xf97cff8c 10:24:50 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x24d4c124427c98fa) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0xfff, 0x1, 0x7, 0x10001, 0x0, 0x7, 0x20008, 0x8, 0x100000000, 0x20, 0x6, 0x100, 0x7, 0x20, 0x200, 0x4, 0xffffffff, 0x0, 0x1, 0x5, 0x854, 0x0, 0xa4, 0x6, 0x9, 0x1, 0x9, 0x4, 0xfdc8, 0x4, 0xfffffffffffffffe, 0x0, 0x1, 0x6, 0x4, 0x8, 0x0, 0x2000000000, 0x5, @perf_config_ext={0x1, 0x5}, 0x400, 0x9, 0x1, 0x5, 0x1f, 0x1, 0x8}, 0x0, 0x4, r0, 0x1) write$selinux_load(r1, &(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESDEC=r0, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES16=r1, @ANYBLOB="110e3512f2258c221ccd78a2139c8016bf90821a121a5a7c4d3d4a3df38ab6722b317ad0469b79760c4b14aa83bb6c683a18b1ed434631e03c010970b70084d64a5e5bab2f71f2842afb9778fcd64a512433f293810da5cc19355b4ff151ead2a567115db54a1cecfa371d2e4741208fa584ccf1946adffb43be6cacf4e064cc61d41dd8c043d226c77c50f6ad8982dceaf0fe5f994b8622bf5f7c15dedfa0b8b89cda3723b24634f59534fa260b791bc95c7f88b7d3768285b6fff0a311bf35fa7505a126b5bf85aec148cb0e41300e81b1c9fcc8b3344973d9843e52d9a8", @ANYPTR64, @ANYRES16=r0, @ANYPTR, @ANYRES16=r0, @ANYRES64], @ANYRES32=r2]], 0x8) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) 10:24:50 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 189.918100] SELinux: policydb magic number 0x317a7973 does not match expected magic number 0xf97cff8c 10:24:50 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:50 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux', "76de0f7cd63bbbf45c3e672070374d4d16dc1351f8aa984543e1272670111a1d9e8897175bceb153855f64a5a47e4a1cd462bd7c5e4f714cedcf64a6f46e1b17588fd0b46fd2e29513d6c64fc376b1e1f43fe321c14b493ab16fd3b965ff18f246563ec3cc69fe6b0cf390b129009de35cd6ae3a21a82803d5bfa3cfc07a5bd6110ded2f0f208517c0391b10a0a75767413b05b9352f7e610955cce927245ad31a2a7ed61ae175fa4c654fef4a05"}, 0xbe) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) pread64(r0, &(0x7f0000000100)=""/254, 0xfe, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0x400, 0x1) write$selinux_load(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812000000004c00000600000007f000113b9f00e3ff060000db3f72acbc21fed6f0eeadb1560ddf46de5b6bc762b9308b1e62bc6e90d6c3ca44046b22f35ef30a4ddb7f5df1b6d64624a54a77b049191fe7e14b896635567f26c1461ee20786a285b6e2ae522d72e6174d855a5e03b7045fc5f399c0f6ea0428a83ea8fcc750cbc000e1c25cd48fe6bcb9c4940c5e8f6aec057e58f083d224599d2d8c4df42f3714f4539168eb45348796e1603c8c2efc7abbebcb52c125271ba03d688b0a5aeda49856442129ae30a9f51d2a4d9d26b4b3cf24a054d82469113ea6000000000000000000"], 0x3f) 10:24:50 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000000), 0x800) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080002005345204c696e7578"], 0xfffffed9) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$link(0x8, r1, r2) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:50 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 190.093753] SELinux: policydb magic number 0x20000100 does not match expected magic number 0xf97cff8c [ 190.111190] SELinux: policydb magic number 0x20000100 does not match expected magic number 0xf97cff8c 10:24:50 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:50 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x4800000) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) [ 190.231864] SELinux: policydb table sizes (6,285274119) do not match mine (6,7) 10:24:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') fstat(r0, &(0x7f0000000440)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x4775, 0x496, 0x2, 0x0, 0x2, 0x7, 0x3f, 0x0, 0xf212, 0xffffffffffffffff, 0x0, 0xffffffff}) 10:24:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000021004c00070000003c9f400000060000"}, 0x23) [ 190.734333] SELinux: policydb version 553648146 does not match my version range 15-31 10:24:51 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf913f90e09004998b4080000005345204e696e7578b5964b040016bf9b0be08f1338adef9cecb77e9e493c1424942db22e02ac6ec6c5"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000880)='projid_map\x00') r2 = syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000b00)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000c40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000f40)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x8916, &(0x7f0000001040)={'ifb0\x00', @ifru_addrs=@xdp={0x2c, 0x3, 0x0, 0x9}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'veth1\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000017c0)={0x0, @remote, @broadcast}, &(0x7f0000001800)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000018c0)={0x0, @broadcast, @multicast2}, &(0x7f0000001900)=0xc) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000001cc0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001c80)={&(0x7f0000001940)={0x318, r2, 0x203, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}]}}, {{0x8, 0x1, r5}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r6}, {0x140, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x27000000000000}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x118, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x50, 0x0, 0x80000000, 0x3a}, {0x5, 0xaf, 0x40, 0x8}, {0x98, 0x9, 0x9, 0x240000000000000}, {0x8000000000000, 0x6, 0x66adc07a, 0x80000001}, {0x7, 0x2, 0x234c, 0x6}, {0x5, 0x2, 0x4, 0x8}, {0x5, 0x10001, 0x3}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xb2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x84}}}]}}]}, 0x318}, 0x1, 0x0, 0x0, 0x4000}, 0x1) signalfd4(r0, &(0x7f0000000000)={0x71bd}, 0x8, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r10 = open(&(0x7f0000000080)='./file0\x00', 0x1a002, 0x8) sendmsg(r10, &(0x7f0000000780)={&(0x7f00000000c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000140)="fb5e99bd31fda9f98bff9da9ade94c147d0d7fce5a91feaaebdd2b13a224f039eb820d8aad01a90de43f9e49a30a116bd3a82b5a56ebc62d4ca0847c9627c87b101fd8da66fef7b351900cd2e03eb394377a72ddca743623ea77094543ce25977edbbf885a374a1c8d855e2e0c46f89867c2945d383c73a257967c60f682652e69fed183f1205cdf1ca5ca05df0ee2096a5633bf", 0x94}, {&(0x7f0000000200)="bbc44789f030f13070eb9ed84dfc667545a1c4122169790a1cda7301004b85fa0579ff087749e2815706bb5423401dca0c4e5c0382671d591bd105e2889a4387134661ada69176bac3878898ab8943db01aa75d1f92b43045bc7ab906d428491145dce1f700d5191b93594016c97a3a9db37da9ab2", 0x75}, {&(0x7f00000002c0)="2f878b10c3bdcfe005cf", 0xa}, {&(0x7f0000000300)="51d5ec22d321dc3f49b66710b8d90d3b34283cb1730793ae310469ea49e9f9d378216b1bc19f92537fb1bee057cb779e5d0c2215e05f0e23e07a2b23bbf9a95e2b711bb9cd3aca291f76f40266d12e063fce22309b2147b44236fd43ef0f0fc7b6c8ebfff887028ca3d808e344b8d7cb2f43da9dc18fb9577b334093f9d473dc252bac3fce14c29a18eb6f41d0ed1d06b1c24f04ad3a955e978d6aa1e5f62ee0b04733dce02dc1e43fd062d912753e67da904cacfee4ad3e5a8ebf1a27900a", 0xbf}, {&(0x7f00000003c0)="315229e4672c214f8927bc84f77e4ced481b6fac5e037258069097f6a28f10ebde103c56bfc91a31217dcbdc6d69ac217626e7e8c2041905696ec75e7306b833a5ab6c6ba80a2efdb38537177b3e2d278d10138b3b0503f1d20b2d43316eaa7c1921f21cd2665e512254e7f8aa012b80e72c63c8371d0a14925ab73e00ac3e81a01e737a1c40208973b72358", 0x8c}, {&(0x7f0000000480)="788599c74d0925ba1d21e0e091e5d12b2f070db2a9abf4b6ec44e1828d59b2d2c734bea724e258776a065584c8346df2f8beeabd9a691f5572e7922306a7531ad9bfe4b941f18d", 0x47}, {&(0x7f0000000500)="5ab9d93361d5d659cedf6cc2ef96", 0xe}], 0x7, &(0x7f00000005c0)=[{0xa0, 0x0, 0x10001, "fa20b273b9708ed635e940bfb5aacf679e5fb66edcbff295ea654c969ba85ca3aaa7960b4e6e4575286f7c5d33ba48f95a69e79ea854aa180c081a08b8833d560a4e15369a7dd453b64b2e797ce13b0b0221e312b8cbcbe1db23124e77b14ef4434eb610fae6e4bd0cb5e7ea1599ab36c548def27c80ff3d5db1afd8e0cc838a15ebf06580230668b853bd"}, {0x68, 0x10d, 0xfffffffffffffc01, "f09de048b027a9833eda0f018f43f15c18f42c349a59baa48d52db212edab9eecd1afa67e17b144658ddf820d68dcb7b61d1d33de2f55d3a77610a364b5d20fb679279150d9f49cbbe4a9a8196a28ccd64"}, {0x88, 0x1, 0xfffffffffffffe37, "2ce8e0732ff707f5ef2721052594249908350cdb0413a8d822a0012ed22995b77247590678c4de81456326e3d1a04a67b133ceba15128c64b06af7bb9617d8dc3b8c4c26ebbf810a6e4fa791e7d489849f838bc8533bf7e8e5452295dab0ef4910bc3c2e4797da77608e7a6691e1fd3a48d5224b"}], 0x190, 0x1}, 0x10) 10:24:51 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) getgid() 10:24:51 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:51 executing program 5: setxattr$security_smack_transmute(&(0x7f0000002fc0)='./file0\x00', &(0x7f0000003000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000003040)='TRUE', 0x4, 0x2) r0 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x80800) r1 = socket$netlink(0x10, 0x3, 0xe) accept4$unix(r0, &(0x7f00000030c0), &(0x7f0000003140)=0x6e, 0x80000) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x2) recvmmsg(0xffffffffffffff9c, &(0x7f0000002d80)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000180)=""/208, 0xd0}, {&(0x7f0000000280)=""/196, 0xc4}], 0x2, &(0x7f00000003c0)=""/248, 0xf8, 0x100000001}, 0x8}, {{&(0x7f00000004c0)=@ax25, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/81, 0x51}, {&(0x7f00000005c0)=""/28, 0x1c}, {&(0x7f0000000600)=""/159, 0x9f}], 0x3, &(0x7f0000000700)=""/251, 0xfb, 0x6}, 0x8}, {{&(0x7f0000000800)=@generic, 0x80, &(0x7f0000002c40)=[{&(0x7f0000000880)=""/187, 0xbb}, {&(0x7f0000000940)=""/160, 0xa0}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/244, 0xf4}, {&(0x7f0000002b00)=""/90, 0x5a}, {&(0x7f0000002b80)=""/57, 0x39}, {&(0x7f0000002bc0)=""/85, 0x55}], 0x8, &(0x7f0000002cc0)=""/191, 0xbf, 0x6}, 0x6f6879d8}], 0x3, 0x0, &(0x7f0000002e40)={0x77359400}) r4 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002e80)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f0000002ec0)='/dev/keychord\x00', 0x101000, 0x0) ppoll(&(0x7f0000002f00)=[{r0, 0x270}, {r1, 0x1010}, {r2, 0x2000}, {r3, 0x104}, {r4, 0x4000}, {r5, 0x100}], 0x6, &(0x7f0000002f40), &(0x7f0000002f80)={0x4}, 0x8) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000003080)="591628d78969b8cee3103841580eb2f4", 0x10) socket$inet6(0xa, 0x2, 0x200000000000003a) 10:24:51 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) timerfd_create(0x5, 0x80800) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:51 executing program 4: perf_event_open(&(0x7f0000940000)={0x20000000000002, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x2, 0x5, 0xe1cd) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r3, 0x37) sendto$inet6(r2, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x7}, 0x1c) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) set_thread_area(0x0) r5 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) close(r2) accept4(r3, 0x0, &(0x7f00000001c0)=0x2ac, 0x0) recvmmsg(r2, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0xfe64, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/212}], 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000140)) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 10:24:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7506000000070000003c9f000000060000b74fdc8dac2c5039d78f1815a5aecb5b44658c6d"], 0x28) [ 190.992287] sel_write_load: 20 callbacks suppressed [ 190.992292] SELinux: failed to load policy [ 191.016616] SELinux: failed to load policy 10:24:51 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 191.188597] SELinux: policydb string SE Linu does not match my string SE Linux 10:24:51 executing program 5: r0 = memfd_create(&(0x7f0000000580)='$vboxnet1\x00', 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) write$P9_RGETLOCK(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0800697036016e6c3000"], 0xa) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)}, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000480)={"62707130000000000000000000000080", 0x21}) r3 = syz_open_procfs(r1, &(0x7f00000004c0)="7e657492006972656c65737300") fsetxattr$security_selinux(r3, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:sshd_key_t:s0\x00', 0x20, 0x3) getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000000c0)) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioprio_get$pid(0x1, 0x0) fcntl$getownex(r4, 0x10, &(0x7f00000002c0)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ptrace$setregs(0x40000000000d, 0x0, 0x94b, &(0x7f00000003c0)="dea0d4e9315762047046aae4f6198d6bd7a047aa5546cbbd7ca40f62212f0a3244272531b3647a48382c050157804509a12a682941fdec530a2e9f2eab0b54") socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x5c}, {0x6}]}, 0x10) sendmmsg(r7, &(0x7f0000000180), 0x40000000000034f, 0x0) fcntl$getownex(r5, 0x10, &(0x7f0000000200)) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000002f80), &(0x7f0000002fc0)=0xc) ioctl$sock_netdev_private(r5, 0x89fc, &(0x7f0000003f00)="3a023c4a0a8fb20951a8fc0d4248b46e9a9e01213c1792c42289451539075c01dec9e048437f4d050d5a49ccdc8dc6e1d12566b7e7cd96a06fbe6981404736a0b61983f9fa760e1e91dcfc68b0b2abd4805b12409b1c3c11dcd98bc27ee98975ebe2d606a7dc5f9c89") socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') unshare(0x0) 10:24:51 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000018c0)=ANY=[@ANYBLOB="8cff7cf90868a2273f6a43137e318cbd110049a96246a990673935ed369adb95f79283267e6f5fcd2d3c43e1692d6502d20e9bfd2aee7446e59713b85ea1051bab4afa1a00f82c81bdaa537889c40124c9f4f9053b6e690a8436ceec87d99e617c20e8c2e806c3f32aad1388e8930125216c5a96a440860d1c9b5e008d246b17b5861a93132af14ac9f110ebaa7570ed0009da1c5a24b99db59ea8673f49721a21ee5840db8ffdf0b84509fcbffdd9c7b8687f2596c8fccf380d0b6910fa14543c6c1c9db168a7d9bd579402b25b4c88c854927551f59a"], 0x62) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = dup(r0) read$eventfd(r1, &(0x7f0000000080), 0x8) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x80800, 0x200000000000084) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f00000000c0)={0x9, 0x3, 0x8, 0x1ff, 0x2}) write$UHID_INPUT(r2, &(0x7f00000002c0)={0x8, "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", 0x1000}, 0x1006) fsync(r2) fcntl$notify(r1, 0x402, 0x0) readv(r0, &(0x7f0000001840)=[{&(0x7f0000001400)=""/199, 0xc7}, {&(0x7f00000001c0)=""/115, 0x73}, {&(0x7f0000001500)=""/241, 0xf1}, {&(0x7f0000001600)=""/132, 0x84}, {&(0x7f00000016c0)=""/106, 0x6a}, {&(0x7f0000001740)=""/215, 0xd7}], 0x6) [ 191.239104] SELinux: failed to load policy 10:24:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='SE Linux', 0x1) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x1c) 10:24:51 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) fsync(r0) 10:24:51 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r1, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r0, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(0xffffffffffffffff, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:51 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 191.479458] SELinux: failed to load policy [ 191.527821] SELinux: failed to load policy 10:24:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '/selinux/load\x00'}, {0x20, 'SE Linux'}, {}, {0x20, '/selinux/load\x00'}], 0xa, "7188edc25ccbc1225618335620f7afddef8bd92c0c2105d41d7995422173ebdd09327008a3fdd062ce041283c02391aeb511d7cbdcef849a28f43b018de0a4a488fa56e05fa9a5ae9644e00c22d576fc9b33e284e6a51bdb3a6ed679125496d560413d3b7f27965f4a765e62c22d839ca5d53a583c13d057e9335c6eda76275a99fa33f4af1ac921244c512f39a1b3d739d3e5e62de78a06ff17b3d028cd306540c968f94dc2e448d269b7770b6173cda8a2d9a8310aa31115f509fa7fd0e63bf89ae24b502177d65171341749cdc0c99cf2c6f12241e450e627d55face6af78de9bd82f58d0087fbe49b81b9c3baa03e52a5c3b0ced662d672711d557db6a81bacbe34834bbf0a2be8a2e0dd82f74f2d6bba20ca93e174b898c6fb37ce13ecdc0f6117bb2c203b3264bec7b5a6ff9453b0de9756868f06922c4ef17ab69613aab7c61a28bddd047f7fd8321be46a538b1e789c0cd6427fe9f193d0f3fafce544b45631999bb63fa25f66e89047349e967c92d826f06bd78c087028c5e3ce96f67f797608058b30dbf743eb75b7f0e7e9fba24e224580fe64c72e978e4ec70d8778dab094f3f25312944e0948d7af020c9d30c0313c15a1a029dafe582b627663e70786daf5ef6e7732a923897333da9dc806dc1168d73cc18646f08dbf85ca00e75023d4386c8704eb5e31303fe6a57e201f8ad66f04c6458ef76bd24a28293acab37dff25bc9f4d994774bace7f4802769963f8c9a475d42f572e590fedd2f2087899276ee7b0e0461b44a5d9d3afde87848e9426b6b79e2871e2b7ba718ce91ebfb741f2f3f41b82dd7c5160a2fce2be9634113d0aaa49ebeb20d4b3a6c16c19ea9e68c8e877e16d26f5d07ee8dbedf24716f3a9e908174bb3990fdf051531cd7d2d17f40698b7dd20ac3b0f0eb9f803ec2744f05f3dc02fb76cb9700239778f59b838bca07a52a2c7e0b4d5ae80b0b591291af6b1b60a0ffbdf2e9234f5061060e8c2baa20a591600071130653cc3c79c9b5807fb6df1ad0986cafbf8ed6a310751cdbe0af98186a94a8a98fd09573f35b3025cd8cc78702860ce13463ab204afa456f4b381fcd1066821f97702b35865468e9966cdfeae38ef61c9322ec1b0ab4e660037198ce770dbbb351c87a22e679acd45a3f6136d9c061310d151999c1a8a1ba4aea2ac29aa2ba6725abfef9ed260761865ca768ca032ea0818cea990f3198fc0372682ecdcc8a3dbf2c43d163ab5324a3da100b8586ec3f45bc4db5f1a023323e52b7cc60379300f6368d61054d3a3a70a98c506ceab52c112b971be2e04e51204ceada861d35113d38d47e02b668e8b3c8a6bf683cbebb1cae34506e73ac4d126541560e89c265330db71a8f887e93e823e12c93ed5faefc75bac3d3d94a0d348d76545987f4ecbe3d2d90c8f39975eac6fc0a02e27895196747231ffdab704bffb50b67961386d1542c7e2d4d0e07ca653abc7cf5e93946feae9badf303c7df7de0097c1c262a593cff6c89cbcb74d4d089fd3e7fe8b410f1d7f02524bc329ccb8d171aedc4609b64f71a916e0f9106ae43193958c65ce9b857aa30cc18622b7b353bdf16b0159401b453304ebe334360b55ea0b25d891bef4dcb5bf622429fb2de71c0d0e4897a43a4c6fedbe38f9db8343eea8cb23b19c5c7785c7a6d6a79b162b9273200c05ce056807f23f31efbc4eba98c94686f7e53fa7328e843f76f32df792ec644ac49db8e59c2ddae4add94d9fd8f9f86b2b787298eec6008befc74a1b436579d509a9bf6f88647294f00119071cb241ff40f56b6232c4c7e647c90f128890e30d37e2572a135b1ac168bab9fb5c85a8037d622b6328db978b9286ff69bbdee09ef8c133b27656374837dbf98b0a2e9cbe5b82fe010e1a5a6ab236de9f392e6287784a565ca4b56498abf63538f9d26cff8c346854115d7de5aca267c5380bc785ecc14eddefe99b6afcf0b6519cad5324338811dbe0717afc2a4dc2f2c6b5c66ae529612344407cb7d8100e9b7322101f29f94dc666ea0952e79c87acfe1a4f3d8e617bfb59e63dcf4c620192cbd55d3814c467965b2181ff69163f3b87517d1289bc1255e1f7c0ce6d2803d64001b058a6897907ff9e610ec9c95603a34239f7de844e82fdc279a786888c40d9eec84af7b31b7d8d9d4994a9bebec168e00355c2de3d5b8d99534322d234f596548c94d81b275e014e2febf7ccd02ae3e8ac0b4458d3c46bb0b4d61dc099b8a891c9d056547d60e01af70a911f313f13896d58a22e6c0a9037b1b91721f78ebd60b7c42dfccc984c8f6c69489756fbb26b1ada14df0c5b38f23dea8bf05e2f84969f6be5c7bb09bd10261952caf15e235f0008b8037eda689d38b83922eda6dab5410769f29863758003a67490f1803a4f6819c5797ae6ed47d329cddbde2b428a801dc913ec1f081b7c60770fc5bf9426d6b6883009aa9b4704c635746c1946bd2a1ed18e98c805542beac99b0f2fd35e4a47fcd0d5d8e5bdd75aea4d1d34bc6e75eb843b0bc44aa4a911429ca42eb409eace18fd1b137fccdf2940f869478aaf76fb4af2757fda11c8ca3640c9c7e1fa9f413280f0b38bec32ddc5355ca924dc43d773b6e1c29a6c3c949d67dbdd2e1266d37a15b405c562bfe71baa165df15578be4e0d809ecf582df9722634801f907defa67516dff35750c5240282a3815a7e983c30323536d07dc0618b5a1a0e7525882d197a215ff4686de54c460b7cb01d5b8bb6147cf4c2f7faff17c226d54d4cc951c05f4d28da28af9cb9c9fb62973ef45e3dcd9c445b3d7fcc259106271a006cef17f1cc08a38669512d51526cf75b1a3e9a1bfa1c06333f04087732df0d180f3832a1dd08820bf40ac8367241f36d64413aa73cb2ef10bef761fa1b5f0b9c045d002655aa8863e573442f6ff411320f9280937644f1bc483f8023f09907c200b75d586767aae035e24a2719d9925345daab88f051eceafca71b490ffb5ec4225bb249ef950413b31d29a8b5bbf66d6e86959341931f0759a5ca7b8f3df4bb3b9c8b591e38129b40dbb72bdae4ac35460addd3182e13434881f42d668c2d55b2e110049de5eba69b90fb4402abd8558becaa8a6a4c470ef97d268b5984ea08bf89f7c0a4b4a67c1f1cf6967f878d116ab61e689bcc95437146f3a57c667d7143c36a99068e7245b9601a5525acb675f6349a11beec2ebcd924528b84a16cf0031dad74848754ce7c51e1bf41e810148201c0a6276d1c2880850c5860c1ba1d32ddcc2184848608de8ac59d4c95df296518391f3e7126e8eae54903c396dac7ca4fac2b2ebd59b7f1bcab996aadc316939f40155dbb8395a9d0f16a0a6813ea4016a0747ebe2937d549b450056e714a585d577684843e15564fc1486cbf96c4766ba1a9030e624848420f11f63eb4eff63e120b332000ecd191958f0dc583ed77c70b815f0460e1188deead4242d004c969d2e29f0a128043f37cd8621512abcfa190a05fdcfc3e1aa393747cbefda856bd1a869ffcd2affe355176b610056cb7dfccfe5bf31d5a6773c99726d6d515bd84059fcfd70c42b744ca3463aad24ea31fbecb61a3449ca2257a6df834beb88bc9322a69578f5fbd842418849f34d97652511dcef195bbc53a5f07bb0800ae7b70ab5865efb205d5041bdbb456a64c087d0a0527d1f7904a18469b60bae1e4f6545b964734f088cc0a23de6877c5d24ed6312d2defb78790720773abfdc5883b8acded276dced82f4733dfaf00fa75975883ad211ce82398aa7f314c8df1a656f6ff17fe04caaa87c875ffbb0df0c5a753867962de0046df1bb8af58a028c9c813500be33bff5d8823d6fe98a10702508ba3b277931dd59d6dac2284688271225534e2336ed455d3e51f12b2717a3934e20628ceb298237bb5512c5b52555b6785b2e52c6f4665ec6ba13023543c97f6cd889385bb8d97d3b288dcd03bf05e2b4daa1917b8a24e09c8b0d3e2e24d7e427389d6df0fd39e7ca41a93a001a0af9f94bafcda544506f2b8efdb6e38795461d619b1e6e8357b75ff6931787acc9c70a29eb8f1568ed0b4ac93cb4cddaaf502a3c8d02d9bf36ceabdb975c6889c47d41f7c688a3a18381cacca7835661b0865f7bc5271bd76ad62e4d480657e2a6f8dd077b22e57f5c318d1be32c81745bbe603122dd547bccc672361e0ad7e149454e778e424f663ba17d085b3077c9a78e07887deba1c63c4974c83dc5d09eb6f5fb7f23836b5a874255eb618e22b2cf8ecd40e47e0a5b71ca7e2f715416761706746ed3958cf9f79b501346ef1ef4fcd12631701f98d505ef3db18f382f358f601c9b017ada83bc18b408afaf1e2d7cfffcbedf9f603e6bcf1ad3d3d92e08aa42b5d0a19d3b1afc1d3ce2ac0b3a56e688f6c9306fff7beac8acc5016a2434e26d86775d998e32aecb03023ccdc4ab97fbc2f6e005c45e320f63f0a8c000b9626be34ce3227acebb0f10ec63e14fb62029a352d3b5a1ff5ed726ba47570460486791140124223b34bb17eb088d71bba32dc97e59f9415e84fdb5f6d2eedb9fc4c1041a95952c5c088c69af1da686340636a860496c3ec8e042c2f4431b0dcf4d5f3ae65bf3c78f4830bdb1c22ed578f82b7e36523452ed9311e948ff296e3c183efdbebfc4cbb503ee51de2a213422d08c3edb0501769167e956da08d1f1aa907d0726f0a3de8ead882cac9b1949a05b981a58c37aabb7dd92f27730f5374640a2534ae2168ca69baa210cfffaf0d19bf863185c8cc7bd52b7734fa862318f0d5fe3241cf76366dab182c0c736adedb44f4610afb95167b0eaf391d0408dca8e4bd564885b8fe93ece9b712fd6e4d79d89a481b9d31fb3b58551b92664fc5aaf1a75522078f9f26e8a6523712adf99a766c82c3270a77af294b2ab03903a3b83ad57b40d6e612e6acec7f2ab9fc88bf0eefe921c6f55632ab367010c852f4ab2482d6fe9ed0ec249aa0e6978997dbd56acda000d77ca3265777d05b81a117b71d633fa5837b4af1f202dcd75819ecafb78701f9c1440977b752470e802037d671e03cc1e5467b133e4f1b20b7f9b99389806841291691bd8215069726cb8ff9656183edc2ed533fa337e530652a706d40de337c9ec71fe7019da9361167007d7106637ade986be58a2cbba3fc6562d6134905343b4cc6955186311f8f76c3d4dd1ea478a8a3c0d8064f2a340ef6d09ca8b09b504e99afbb859a26e4a5ede8f1a525a461ff5ee1cd1f268fec560bbe2e2a5e3a5c220f4e4ba1b4f668e965fc1072ddd26c5c1a25645f697ef79c83cd13646a437bad1cc933ecdbe6fb3ab582bf7d33be1b5963e10733a9fcbe25b3b5074559a00248bec6c99706556c17cfac625e8c1dc2430b2ffed7d62869329d6b4a93a548df3999538add517ffbc5121638bff9306b5c8704823e52542166e3609b3107f4d395c1c47f3f5d834ce184fe8f8737e6278da20b24b95d2129847e4b12b148c6a732f1c6944e37c7e7d758fbf45d2cca3fb94a174edc2f704b49538419416ec6b38237aeea7af7dd48b3170e6ab695b80f622437af181c5fe2b4197c7d56829aec2364219a073dc22987736aeab1dd5ebcb908f36a5da65a2693b2f7a877d6ab6d3e6b240d444411060f6f0c841c5caff9d2686ce963cdb179d3c8413114e3e8ddf172952403987672f0692ca1c0cab2c934aba0b62da3eed469883f6b59b55f5b5d54af496c4f4c62fdeb6eb6aeaa8bb791e7d5bf6ff94d781a016a12ced14f44dccaaa5949f296617cd655a6200ef61fc54"}, 0x1033) 10:24:51 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000080)) r1 = memfd_create(&(0x7f0000000380)='/selinux/load\x00', 0x2) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000040)={0x81}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000005c0)) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="f8659e56431545cbfd32f07cb098c50f80"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000000c0)={@empty, 0x0}, &(0x7f0000000240)=0x14) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)={'team0\x00', r2}) 10:24:52 executing program 4: perf_event_open(&(0x7f0000940000)={0x20000000000002, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x2, 0x5, 0xe1cd) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) bind$inet6(r3, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r3, 0x37) sendto$inet6(r2, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22, 0x7}, 0x1c) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) set_thread_area(0x0) r5 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) close(r2) accept4(r3, 0x0, &(0x7f00000001c0)=0x2ac, 0x0) recvmmsg(r2, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0xfe64, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/212}], 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000140)) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 10:24:52 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:52 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) pipe2(&(0x7f0000000100), 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) [ 191.835098] SELinux: failed to load policy 10:24:52 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000000)={'teql0\x00', @ifru_ivalue=0x8000}) 10:24:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) prctl$PR_GET_SECUREBITS(0x1b) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) [ 191.865863] SELinux: policydb magic number 0x2e202123 does not match expected magic number 0xf97cff8c [ 191.888739] SELinux: failed to load policy [ 191.902371] SELinux: failed to load policy 10:24:52 executing program 0: seccomp(0x0, 0x1, &(0x7f0000000080)={0xa, &(0x7f0000000000)=[{0x3, 0x6, 0x0, 0x5}, {0x4, 0x4c43, 0x9, 0x80000001}, {0x81, 0x1000, 0x1, 0x8}, {0x2, 0x3f, 0x101, 0x23f}, {0x5, 0x7, 0xfffffffeffffffff, 0x81}, {0x7, 0x0, 0x17b8, 0x9}, {0x0, 0x0, 0x6, 0x8}, {0x100000000, 0x3, 0x8001, 0x1000}, {0x80, 0x0, 0x5, 0x10001}, {0x0, 0x800, 0x3f, 0x625b}]}) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) prctl$PR_SVE_SET_VL(0x32, 0x2b6f8) 10:24:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578539564f147872bad85dde3ed25142901848951833caa6f69e3bdc4418d0e0a47bbe7ebf0323a9a6083de04ae7095946f9f21072b5ac50ab4945119a03d310c8165be9731c2bcf0a852bf54376bb1d62fa81cc0359020e80b4a8eb65e4c3d7e87331fac8598bc6e26025c2acc6f0b3099857a3e9650e389e5924cf859db8b615565efb5a0ebd164bb155eea5e9a4025738dd09c0ba699815754e4"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) flock(r0, 0x4) fadvise64(r1, 0x0, 0x9, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futex(&(0x7f0000000040), 0x0, 0x1, &(0x7f0000000100)={r2, r3+10000000}, &(0x7f0000000140)=0x2, 0x0) [ 191.998496] audit: type=1400 audit(1544091892.339:44): avc: denied { getopt } for pid=8148 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 192.021359] SELinux: failed to load policy [ 192.022583] SELinux: failed to load policy 10:24:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x101000, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) r3 = gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = getuid() fstat(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000280)='./bus\x00', r4, r5) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xa) write$selinux_create(r0, &(0x7f0000000540)=@access={'system_u:object_r:system_dbusd_var_run_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x3}, 0x58) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f00000003c0)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000240)={0x2}) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f00000001c0)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {0xfe8}, 0x10000000, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) sysinfo(&(0x7f00000007c0)=""/154) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x209a, 0x8, 0x4, 0x0, 0x0, 0x9, 0x0, 0x6, 0xffff, 0x1, 0xfffffffffffffff9, 0x6, 0x0, 0x1, 0x0, 0x6, 0x0, 0x86, 0x7fff, 0x7464, 0x9, 0x81, 0x8, 0x3ff, 0x8001, 0x4, 0xcf, 0xf599, 0x4, 0x9, 0x0, 0x0, 0x0, 0x5, 0x8, 0x3, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x10001}, 0x8, 0x0, 0x2, 0x0, 0x7, 0x0, 0x1000}, r3, 0x0, r2, 0x1) ioctl$BLKPG(r6, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) syz_open_procfs(0x0, 0xfffffffffffffffe) 10:24:52 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x185, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r3, 0x0, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f00000001c0)={@loopback, 0x101, 0x2, 0x2, 0x1, 0xfffffffffffffffb, 0x3, 0x8}, &(0x7f0000000200)=0x20) connect$netlink(r4, &(0x7f0000000240)=@kern={0x10, 0x0, 0x0, 0x42000000}, 0xc) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x40000, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) 10:24:52 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:52 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(0xffffffffffffffff, 0xb) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000080)=""/216, 0xd8, 0x984c, 0xecf8, 0x8, 0x3, 0x4800000000}, 0x120) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = socket(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000340)=""/233) sendfile(r1, r2, 0x0, 0x80000001) 10:24:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000080)=r2) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) fstatfs(r1, &(0x7f0000000180)=""/70) 10:24:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812000000004c0000000000003c9f00000006000000001000"], 0x28) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000000040)={@loopback, 0x0}, &(0x7f0000000080)=0x14) sendto$packet(r1, &(0x7f0000000100)="e806cdc5e47a6ef8b0d3e58c6a4746b41ba0d49b56c88d03972e3eece2a4f426b3b8d6585920cdc812fb8e56b097bb8b43fa038c502eb4035e6c90dbec027e37618c10a2716d43217fca8acbbca73127844f020f54484e3ec1c7b1dfe41b67dde7c9a3abce30a0a30fc21cfd146647321289b16e53837e4f956c42ab581b34f901ae20c99d445805ffc3dd8731513479b27cc14784225bf11bd61d7759ed3c1a484dba60748ab2479dcfbb58530f30f7e4805dabf87a15a6d14f3a0daa59ff5a36c51c9456753f8d", 0xc8, 0x0, &(0x7f0000000200)={0x11, 0x758bc63862711a2, r2, 0x1, 0xfffffffffffffe00, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) 10:24:52 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75784f6d39374e7394188c8ac7f558c0bb1dbf3b90f3ffb43364d4cc98d7765f03aa7191aa88ac75cebdca"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000001c0)={'team0\x00', r2}) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x2042, 0x0) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000000080)={0x3, 0x40, 0x101, 0x20, 0x5, 0x9, 0x10000}) write$P9_RATTACH(r3, &(0x7f0000000040)={0x14, 0x69, 0x1, {0x6, 0x1, 0x4}}, 0x14) 10:24:52 executing program 4: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpgid(0x0) prlimit64(r1, 0x0, &(0x7f0000000080), 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) bind$inet6(r2, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x18, &(0x7f00000001c0), 0x4) r4 = open(&(0x7f00000034c0)='./bus\x00', 0x100000141042, 0x0) getrandom(&(0x7f0000000040)=""/26, 0x1a, 0x1) ftruncate(r4, 0x10099ba) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendfile(r3, r4, 0x0, 0x1000000000000fe) connect$unix(r3, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400000, 0x0) [ 192.252055] SELinux: policydb table sizes (0,40764) do not match mine (6,7) [ 192.281696] SELinux: policydb table sizes (0,40764) do not match mine (6,7) 10:24:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x2) r2 = inotify_init1(0x80000) fsetxattr$security_ima(r2, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "a9b86a2fdac1e4693ee8a24bfd646531"}, 0x11, 0x1) 10:24:52 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000005001}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x40000200000, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{r3, r4/1000+10000}}) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000004500001c0000000000009078e0000001e000000200009078ffffffff0000000000000000005eeae83d12304a0e"], 0x2a) poll(&(0x7f0000000080)=[{r1, 0xc}, {r5, 0x30}, {r1, 0x2660}, {r2, 0x6000}, {r5, 0x1200}, {r1, 0x2000}, {r5, 0x8}], 0x7, 0x8) 10:24:52 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:52 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) socket$inet6(0xa, 0x807, 0x100000000) 10:24:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="f01c82a9c5656f6e137fc148e3635f56d3f0f1689783e4e477ccb5bd98064ad0cbeacacfa4b36bbb90608c07832b9cd0cc661000a7c7665ea9e6dad469b0d4766801971ffe698591e78fbed1c4d77003d6af0f1688fa9607ecea5bba1e73e269fb49f8396139512995ff4f3a8f377551ae6cc40eac8fb12800000000"], 0x7c) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) r2 = dup3(r1, r0, 0x80000) inotify_add_watch(r2, &(0x7f0000000100)='./file0\x00', 0x0) 10:24:52 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x6, 0x1, 0xbff0, 0x4, 0x0, 0x0, 0x0, 0x1, 0xff, 0x6, 0x2, 0x8, 0x6, 0x8, 0x0, 0x3, 0x3, 0x66, 0x8000, 0x0, 0xa98, 0x100000000, 0x7cff8a5c, 0x1ff, 0x4, 0x4, 0x0, 0x2d3, 0x4, 0x5, 0x6, 0x1, 0xd97, 0x100000001, 0x7f, 0xd7, 0x0, 0x200, 0x3, @perf_config_ext={0x1ff, 0x8000}, 0x200, 0x7, 0x800, 0x7, 0x1ff, 0x33186a00, 0x3}, r2, 0xe, r0, 0xa) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x30, 0x8000, {"f084c01e1dfca4afa4ba02885f3b3416ca288374b1242b"}}, {0x0, "27a2"}}, &(0x7f0000000240)=""/221, 0x34, 0xdd}, 0x20) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141442, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) open(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0xcd54) preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x5, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 192.531862] SELinux: policydb magic number 0xa9821cf0 does not match expected magic number 0xf97cff8c [ 192.546573] SELinux: policydb magic number 0xa9821cf0 does not match expected magic number 0xf97cff8c [ 192.556124] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 192.556286] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 192.556584] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! 10:24:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_CREATE(r1, &(0x7f0000000100)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/123, 0x7b, 0xba942dd, 0x0, 0x8000, 0x8, 0x3}, 0x120) 10:24:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0x20, @loopback, 0x1c}, {0xa, 0x4e23, 0x8, @ipv4={[], [], @multicast2}, 0x7ff}, 0x10001, [0x5b77, 0xfff, 0x0, 0x7fff, 0x57a, 0x131, 0x7, 0x5e]}, 0x5c) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0xa9, @local, 0xfff}, 0x1c) [ 192.556701] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 192.590397] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 192.597514] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 10:24:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 10:24:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x7fffc) write$uinput_user_dev(r1, &(0x7f00000002c0)={'syz0\x00', {0x1e, 0xfe, 0x20}, 0x1f, [0x7f, 0x332, 0x20, 0x44b6, 0x4, 0x3ff, 0x6, 0x0, 0x1ff, 0x6, 0x10000, 0x5, 0xafc, 0x3f, 0x7, 0xfffffffffffffff8, 0x4, 0xffff, 0x1, 0x10001, 0x5, 0xffffffffffff8000, 0x3, 0x5, 0x20, 0x6, 0xffffffffffffff70, 0x5c890f2e, 0x9, 0xfffffffffffffc01, 0x6, 0x0, 0x5, 0x4, 0x3ff, 0x4, 0x4, 0x0, 0x4, 0x3, 0x8, 0xf39, 0xe0a, 0x3, 0x9, 0x7, 0x6, 0x3, 0x80000000, 0x2, 0x2, 0x10000, 0x4, 0x9, 0x5, 0xfff, 0x8, 0x1, 0x3, 0x5, 0x6, 0x20, 0x9, 0xfffffffffffffffa], [0x8001, 0xa, 0x7, 0x100, 0x1, 0x5, 0x1d, 0x2, 0x40, 0x0, 0xff, 0x9, 0x8, 0x2, 0x69, 0x80, 0x1, 0x68, 0x7, 0x3, 0x200000000, 0x2, 0x757, 0x4, 0x3, 0x5, 0x3, 0xffff, 0x4f1, 0x6, 0x3, 0x1, 0x6, 0x2, 0x8, 0xfffffffffffffff8, 0x4b9d364, 0x8f, 0x8, 0x401, 0x800, 0x180, 0x1, 0x8, 0x20, 0x1, 0x6, 0x0, 0x3, 0x9, 0xc860000000000000, 0xbc06, 0x100000000, 0x0, 0x4, 0x3eb, 0x16e, 0x0, 0x7ff, 0x2, 0xbff, 0x2, 0x0, 0x439], [0x1ff, 0x7f, 0xfffffffffffffff7, 0x3, 0x4, 0x1, 0x0, 0x8000, 0x6, 0x7, 0x100, 0x6, 0x10000, 0x6, 0xfffffffffffffffe, 0x433, 0x8, 0x80000001, 0x6, 0x8, 0x8, 0x836a, 0x4, 0x8001, 0x4, 0xe2, 0x7, 0x1, 0x4, 0x100000000, 0x200, 0x80, 0x8, 0x2, 0x100000001, 0x5ae6, 0xedc, 0x2, 0x9, 0x2, 0x81, 0x4, 0x4, 0xff, 0x800, 0x1ff, 0x401, 0x9, 0x2, 0x4, 0x8, 0x8, 0x1, 0x4, 0x4, 0x10000, 0x7fffffff, 0x4, 0x8000, 0x3, 0x33b04000, 0x1000, 0x2, 0x101], [0x40, 0x8, 0x401, 0x8, 0xe000000000000, 0x0, 0x7, 0x3, 0xb6, 0x6, 0x4, 0x400000000000000, 0x2, 0x0, 0x7fffffff, 0x80, 0x1, 0x19dd, 0x40000000000000, 0x80000001, 0x0, 0x400, 0x0, 0x7, 0x0, 0x3, 0x74, 0x800, 0xd9, 0x1, 0x8001, 0x8154, 0x7fffffff, 0xb90, 0x200, 0x0, 0x0, 0x1, 0x100, 0x3, 0x0, 0xfffffffffffffff9, 0x8, 0x9, 0x10000, 0x6, 0x1, 0x1, 0x8, 0x7fffffff, 0x2, 0x8, 0x7f, 0x8, 0x40004000, 0xf080, 0x24, 0x3, 0x10001, 0xfff, 0x4d, 0x5, 0x2, 0x401]}, 0x45c) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x1, 0x0, 0x1f}) prctl$PR_SVE_GET_VL(0x33, 0x19f24) dup3(r0, r1, 0x80000) 10:24:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:53 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000000)={'team_slave_0\x00', @ifru_map={0x1, 0x3, 0x308, 0x7, 0x1, 0x9}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x7, 0x4) 10:24:53 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = getpgrp(0x0) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1, 0x0, 0x6, 0x4, r1}) r2 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x80, 0x80000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) socket(0x5, 0x3, 0x400) socketpair(0x5, 0x805, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) renameat2(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x1) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) [ 192.890231] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 10:24:53 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 193.100167] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 193.270229] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! 10:24:53 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x6, 0x1, 0xbff0, 0x4, 0x0, 0x0, 0x0, 0x1, 0xff, 0x6, 0x2, 0x8, 0x6, 0x8, 0x0, 0x3, 0x3, 0x66, 0x8000, 0x0, 0xa98, 0x100000000, 0x7cff8a5c, 0x1ff, 0x4, 0x4, 0x0, 0x2d3, 0x4, 0x5, 0x6, 0x1, 0xd97, 0x100000001, 0x7f, 0xd7, 0x0, 0x200, 0x3, @perf_config_ext={0x1ff, 0x8000}, 0x200, 0x7, 0x800, 0x7, 0x1ff, 0x33186a00, 0x3}, r2, 0xe, r0, 0xa) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x30, 0x8000, {"f084c01e1dfca4afa4ba02885f3b3416ca288374b1242b"}}, {0x0, "27a2"}}, &(0x7f0000000240)=""/221, 0x34, 0xdd}, 0x20) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141442, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) open(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0xcd54) preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x5, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 10:24:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f0000000100)="83f87809f47e0be2d53840bc20107845c688d69fedc45b914bca88901512150b8521b16ae12c3f0b1b416ef02af7a5fd70bc8e60cd9cd7a4c93964f3081e9387a439722c5d006eb88c81885ba0703806164147e7c0785a2be7e47c512dd112ac5df688b4ad1303c678b57e97fdaa1a122d40df8904e7bfc25c0838c69cbabdcab45eb055d6c1a73fb5b753a37fdf19d476de3b94462e637846f464b69e1e254147", 0xa1) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f00000002c0)=""/220) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req={0x80000001, 0x2, 0x7fffffff, 0x1}, 0x10) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:53 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) io_setup(0x9, &(0x7f0000000340)=0x0) io_cancel(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xf, 0xffff, r0, &(0x7f0000000480)="558302e839f587554df2406d5ed31549477ed6bbe7f74079cf0683c2c8b6aaad6b6fdca4e0e0cd66f3384092b7afb72ae9c72ddacae34fe5cc5ee2e884d6b9c533a0255fc08cc69830e283eb1a60264646a36ee138f8ad4115f7e0a35f39b0769fb86761b3907c6eac49e719d4c8f56c178c605ca5770799ac832831014ccef08e0325ad557851cd0ed0edb24b8b903f72e8c53b4680ab759b65fcca1aa12134b58303c921be7db92310c5033e2890249ded80a3d7bb37", 0xb7, 0x3, 0x0, 0x3, 0xffffffffffffff9c}, &(0x7f0000000540)) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=@random={'system.', "74086e750000000000000000008c00"}, &(0x7f0000000400)=""/116, 0x74) flistxattr(0xffffffffffffffff, &(0x7f00000008c0)=""/249, 0xf9) keyctl$setperm(0x5, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="4000000010003b0e000000000000000000000000f293774c9a2e41a4ed7f7f9f285e35fa5e95f99b80d8ef08eaa61b8eb1b7dfec942956f09d163bf70f61ec4aaaeea50bba63536d84287618976a70919cf2d37690fc", @ANYRES32=0x0, @ANYBLOB="430200000000000008000a00060000001800120008000100767469000c00020008000400e0000002"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @multicast2}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_bond\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$eventfd(r2, &(0x7f0000000240), 0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000680)='uid_map\x00') r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r6 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) pwritev(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) ioctl$TCXONC(r4, 0x540a, 0x1) sendfile(r5, r5, &(0x7f0000000000), 0x2000005) 10:24:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="68afb03fd6ca0744eb0e122e5eb461ab"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:53 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:53 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="8cff7cf90800000053dca6e3da4070dc213f19114ecb3b4485a0b20504b9d58b1c2c53705ae045204c696e757812000000004c000006000100070000003c9f00000006000024aa716910aab00c9161cd0caa23838ea4a729b12241d88c8f67256b0530de09ae5ce1ed63c56165330100d4c6731f1f94573ffcb18b3d134b6afe4139053e7fad2cae2be2dc466ad795e448b5890cd5a94b855c72e00cf0c7d5859fc85da5789621eaea3aa25e130a5b348239a329b1d6a0bd5afafaeaae5160e70a9adba866febbce45a92c56b878ef38f832da608d2c890c99d548a242c5cd26"], 0xe0) 10:24:53 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) accept4$packet(r0, &(0x7f00000002c0), &(0x7f0000000300)=0x14, 0xbb07fc43d8f62d29) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000040)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6274616401"], &(0x7f0000000140)=""/225, 0xe1) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0xffffffffffffffd0, 'SE Linux'}, 0x10) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000340)={0x7ff, 0x7f, 0x1f, 0x6}) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) fchdir(r1) [ 193.455708] netlink: 32 bytes leftover after parsing attributes in process `syz-executor5'. [ 193.590156] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 10:24:54 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 193.646720] SELinux: policydb string SܦãÚ@pÜ does not match my string SE Linux 10:24:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) chroot(&(0x7f0000000000)='./file0\x00') write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux', "12000000004c000006000000070000003c9f000000060000"}, 0x28) 10:24:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cff0f0000000000004c696e7578"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 10:24:54 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:54 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x14000, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000200)='/dev/keychord\x00', 0x101200, 0x0) r3 = epoll_create(0x0) r4 = accept$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x2, 0x0, @multicast2}, &(0x7f0000000280)=0x10) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x802, 0x0) r6 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r7 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ppoll(&(0x7f0000000300)=[{r0, 0x1008}, {r1, 0x2000}, {r2, 0x4002}, {r3, 0x400}, {r4, 0x1e9}, {r5, 0x5000}, {r6, 0x8524}, {r7, 0x8000}], 0x8, &(0x7f0000000340)={0x77359400}, &(0x7f0000000380)={0x1}, 0x8) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x1}, 0x20) pipe(&(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x115882, 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x200000, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f00000000c0)="c6be0ebb6d9af66f33d07400100000b4871f22a5b94f3405e514454a2d5804ba7756d59aaff5af62319ca08dc089640d693a8802c05404e5300000000000", 0x0, 0x0) ioctl$RNDCLEARPOOL(r10, 0x5206, &(0x7f0000000080)=0x11) 10:24:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x5, 0x219c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x3, &(0x7f0000000040)=[{0x2, 0x400, 0x1ebf, 0x1}, {0x100000001, 0x575, 0x5, 0x5a}, {0xde23, 0x1, 0x79d, 0x6}]}, 0x10) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f00000001c0)=0x6) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000080)={0x3, 0x1, 0xb3}) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000000)) 10:24:54 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:54 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x7) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) r2 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000080)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f00000001c0), 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:24:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0xfffffe88, 'SE Linux', "120000f6ff05000000000000006b9470ceefec4b186a09cd03fac94a9e892f7707d131a22d2a1c0cbedd1ff08b978b7b9816858b0d88350be4036f4e3069e7"}, 0xffffffffffffff01) 10:24:54 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(0x0, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = socket$inet6(0xa, 0xa, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000140)) ioctl$FIGETBSZ(r1, 0x2, 0x0) 10:24:54 executing program 0: geteuid() fstat(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000001c0)={0x9, 0xd9a6, 0xff, 0x6, 0x5768}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000004c0)={0x7f, @broadcast, 0x0, 0x0, 'lblcr\x00', 0x0, 0x7, 0x17}, 0xfdf1) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x100) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) sendmsg$nl_route(r2, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@ipv4_delrule={0x20, 0x21, 0x101}, 0x20}}, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000040)={0x5}) getsockopt$inet_tcp_int(r0, 0x6, 0x3e, &(0x7f00000000c0), &(0x7f00000005c0)=0x4) r3 = dup2(0xffffffffffffffff, r1) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x128) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'gretap0\x00', 0x3000}) close(r3) request_key(&(0x7f0000000300)='ceph\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)='rootcontext', 0xfffffffffffffffa) mkdir(&(0x7f0000000280)='./file0\x00', 0x10) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000480)="60458ffd9cd0cd4f20e6de3b689a1e") mount$bpf(0x0, &(0x7f0000001740)='./file0\x00', &(0x7f0000001780)='bpf\x00', 0x0, &(0x7f00000017c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 10:24:54 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:54 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:54 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x7) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) r2 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000080)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f00000001c0), 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:24:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8c40000000696e7578"], 0x9) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x400, 0x9, 0xdf, 0x3, 0x8, 0x3, 0x3e, 0x2b4, 0x355, 0x40, 0x309, 0x1, 0x20, 0x38, 0x2, 0x9, 0x1, 0x3}, [{0x6, 0xb, 0x0, 0x8, 0x132, 0x8, 0x3, 0x400}, {0x6474e551, 0x1, 0x6, 0x1, 0x9, 0x80000000, 0x80000000, 0x8}], "655faa7ac5709a9b206b5890c68d10be7e61e25d483780dd55ce31ef066c325da18301a163a4d4afd4c0e65364c1bd343b0f6d91b78ce88487460adc08cb1db76fe8fdc8de7cfdb2625874cb9dc93baa20a3fa70af8e86dc9b3406cdee9f0190516c4fcbc1d86fab14338c1eabffb0b1bc376b6d53432caffc0492ed99e4f15515ff33aa64cd3e88851b3b20aca4bc6c7d9934b5effbc873999157f933e005ec027919478045673b5efcf2a188981cf93db304a1dc2a710296621c86731faf3bbf9eeac524cd5ab05cd9d87793b133cf31cd334b4600", [[], [], [], [], [], [], [], []]}, 0x986) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fremovexattr(r1, &(0x7f0000000100)=@random={'osx.', 'ipddp0\x00'}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ipddp0\x00', &(0x7f0000000040)=@ethtool_modinfo={0x42, 0x0, 0x7, "278b9e5cbbda043e"}}) [ 194.412750] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 194.466430] SELinux: security_context_str_to_sid(staff_u) failed for (dev bpf, type bpf) errno=-22 [ 194.482149] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. [ 194.494295] SELinux: security_context_str_to_sid(staff_u) failed for (dev bpf, type bpf) errno=-22 10:24:55 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$apparmor_exec(r1, &(0x7f00000000c0)={'stack ', "b200"}, 0x8) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/170, 0x10}], 0x1) 10:24:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf927000000fd6b29b73f9477c8"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={@local, 0x65, r2}) 10:24:55 executing program 0: fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) fstatfs(0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00 \x00\x00\x00\x00\x00'], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='f2fs\x00', 0x400, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000000)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, 0x0, &(0x7f0000000600)={'U+', 0x6}, 0x28, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) 10:24:55 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:55 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', 0x0, 0x0, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:55 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000015c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:55 executing program 4: ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setrlimit(0x40000000000008, &(0x7f0000000000)) getrusage(0xffffffffffffffff, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r1, 0x0) readv(r0, &(0x7f0000000180)=[{0x0}], 0x1) 10:24:55 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:55 executing program 0: rt_sigprocmask(0x2, &(0x7f0000000280)={0x26}, &(0x7f00000002c0), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="2321202e2f66696e653020000ab0782acd5fc7c66f4e95e5b431d6766425fd53fab975a37a3e549d0aa38508a99caa16b43858ea55e0ec6329c2c365c9937da1acb4055d9eb85bf507436127e72d3e6041987d91694bd5554024fa74ea06e05634a48456f0bbfd7ad600"], 0x65) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000340)={'HL\x00'}, &(0x7f00000003c0)=0x1e) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r4 = socket$inet6(0xa, 0x80a, 0x5f7a) listen(r3, 0x80001000) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000300)={'rose0\x00', {0x2, 0x4e24, @multicast2}}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, &(0x7f0000000300), 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) readv(r5, &(0x7f0000000700)=[{&(0x7f0000000440)=""/132, 0x84}], 0x1) r6 = accept4(r3, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) pause() ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) shutdown(r5, 0x1) sendto$inet6(r6, &(0x7f0000000180)="41465a39a172dd651d1f01fcdb315cb1fc1ea8470b32103a9a9ee1d40be9106bc3fedaf3e877113460132182cb1ecd0301db37f72e11b95aa592e5ada4368d91d5502919a4523d017b370f57eed68d0d2bf06798038d0d1e551ebe5b8583ae90b8d3daf27d656dcf5409fe52c6167c96e8cc0498db874c39c7e317ff08cbfe6e2888391c83288ca9ef54ce7231b42e923793cf99e68338f10fee42c601e2016ab984f67a3a285eecc4f670f486ce30db87f9b75852fdc7baab50cbdae084648e0a1750036d89b0a92dea89bb37a79bfc528201ec9a8bd4339ac312bd9b21a741d80dd0f935a1df37bf463ab376", 0xed, 0x0, 0x0, 0x0) 10:24:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) dup2(r0, r0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20800, 0x0) socket$inet(0x2, 0x7, 0x4) r1 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) [ 195.248150] audit: type=1400 audit(1544091895.589:45): avc: denied { map } for pid=8426 comm="syz-executor4" path="socket:[23804]" dev="sockfs" ino=23804 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:24:55 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000000140), 0x0, &(0x7f00000003c0)=""/129, 0x81}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1800000016000d0f00000002000000", @ANYRES32=0x0], 0x18}}, 0x0) 10:24:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:55 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:55 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200000, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000040)={0x43, 0x9, 0x2, {0x0, 0xfff, 0x5, 0x2, 0x5, 0x9, 0x7, 0x9, 0x3}}, 0x43) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:55 executing program 4: socket$inet(0x10, 0x0, 0x0) socketpair$unix(0x1, 0x2004000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[]}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) write$binfmt_elf32(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8000, 0x0, 0x20, 0x6, 0x7, 0x2, 0x7, 0x2, 0x36, 0x38, 0x3, 0x3f, 0x7fff, 0x20, 0x2, 0x43c, 0xe0e, 0x4}, [{0x1, 0x3fe8, 0x1, 0x76, 0x2, 0x514, 0x8001, 0x1}], "aa4a8675f20aa784f1eb0c2e8c864cbcdf6bdd729658f2dcf2f1a486271e7c87cdc103604da2bdb0fb0087239aa7434a4e5832ad00ec2b9e9328cea6a55879224a164a980c978cbbba7ccee91a92a9ff4caaf050b00102421890b839c96f2fcfed37c86e455eee15c42bdeff0ec5", [[], [], []]}, 0x3c6) sched_setattr(0x0, &(0x7f0000000040), 0x0) delete_module(&(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x800) 10:24:56 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8018802}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0xe4, r2, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3898}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x38b37785}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7fff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsf0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100000001}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0xd}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffc}]}, 0xe4}, 0x1, 0x0, 0x0, 0xc000}, 0x4044804) r3 = dup(r0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000740)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)=@delsa={0x98, 0x11, 0x10c, 0x70bd2b, 0x25dfdbfe, {@in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4d5, 0x2, 0xff}, [@policy_type={0xc, 0x10, {0x1}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x4e23, 0x4e22, @in=@loopback}}, @etimer_thresh={0x8, 0xc, 0x9}, @output_mark={0x8, 0x1d, 0x1}, @srcaddr={0x14, 0xd, @in=@local}, @offload={0xc, 0x1c, {r4, 0x2}}, @extra_flags={0x8, 0x18, 0x7}, @output_mark={0x8, 0x1d, 0x294}, @tfcpad={0x8, 0x16, 0xa3a}]}, 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x1) socketpair(0xb, 0x80f, 0x40, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$FIGETBSZ(r1, 0x2, 0x0) 10:24:56 executing program 4: r0 = epoll_create1(0x80000) r1 = epoll_create1(0x0) close(r0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)) 10:24:56 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f00000f5ffc)=0xffffffff00000003, 0x4) bind$inet6(r1, &(0x7f0000710fe4)={0xa, 0x4e21}, 0x1c) r2 = socket(0x10, 0x2, 0x0) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)="e27f8f89f5f8637d835ec31aee30b66d8a538bf508f245201d584984ea896c5df7100a44e3b1e5e1adb1f4bdddb57ec29821f58d432b527658eaf95609f12865f19e46ef9c5ba9f162fba59f9dcb1f88d96bb3a2a651c5f50f0e5aabfea3499ac71d877b30f569b62bd14c528b984300fdc8b11ed5a5c57fa729", 0x7a, 0xfffffffffffffffa) keyctl$describe(0x6, r3, &(0x7f0000000280)=""/225, 0xe1) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@get={0x1, &(0x7f0000000380)=""/197, 0xba81}) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r2, r4, 0x0, 0x80000002) creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000480)=""/249) 10:24:56 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r0, 0x10e, 0xb, &(0x7f0000f67000)="9adc01ce", 0x4) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x6, 0x6, 0x6e, 0x401}, 0x10) write(r0, &(0x7f0000000140)="2200000018007c4e47d7b1ccff652186979f580700f417e512b87cba48c1cb65d145", 0x22) 10:24:56 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:56 executing program 0: clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) shutdown(r1, 0x0) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:24:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 10:24:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 10:24:56 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000009c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)="2c0271", 0x3}], 0x1}, 0xc101) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="d09a", 0x2}], 0x1}, 0x0) 10:24:56 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x11b8a72400f5d883, 0x700000000000) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000003c0)) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = fcntl$dupfd(r0, 0x406, r0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x148}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x20, r4, 0x830, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}]}, 0x20}}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) unshare(0x400) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x200031, 0xffffffffffffffff, 0x0) write$selinux_access(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x4c) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)=""/8, &(0x7f0000000000)=0xfffffffffffffda3) 10:24:56 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) ptrace$getregs(0xe, r1, 0x8001, &(0x7f00000001c0)=""/239) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x102, 0x0, 0x157) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r2, r2, &(0x7f0000d83ff8), 0x8000fffffffe) timer_create(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x4, @thr={&(0x7f00000002c0)="aeaa8b3a3ef9ae65faf3f5c07b82b2db004086470c5ca2921113eed659f549b7afc5320b30c88f9115878b002f6094a080d686d1faa23870f58198af6a5ee59c0d4936fbe3dd9ab9b28881d461a08e4a32ec6a45ccb7a7459b8704ffd4745119b2c00ca53187d7470ec69f7c44d29285c400444d23320a3d43ff74bb90838d78a23e5371f9c7b615d07ad430ec7229eba7ca54c319ae30df6d8a06fd714c528f09aad67a5570ebcf67e4f0070c0b304748fb7634e1ad8141886f2e21b0e800", &(0x7f0000000380)="14b35de33032294e433386593523e2191b066e8fa0aa9e626431cb2d79c64d4a7129524874e0abd4b797fbbfd89610b960a99e0a80ad066db5a43747ab9039b2746bad4f96eae3468c6ddd082eda6098866bc36aabaa5177156d6a01b19b1550e66d20b2fbcaacf829d0aa8374987f4b84fedfaa364e500722f7949f2f838ccbeff1dac8a53339402022dee266b7cdaf776117f09c77d8a2141960dc38a5d0bdfaf37ad89caab4eab86ee635727291c1a6d4dc169d23790519d4f8d063d75f931e3fa2b9"}}, &(0x7f0000000140)=0x0) timer_delete(r3) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) write$selinux_create(r0, &(0x7f0000000480)=@access={'system_u:object_r:udev_helper_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x6}, 0x4c) [ 196.431036] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8224 sclass=netlink_route_socket pig=8514 comm=syz-executor5 10:24:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000300)) socket$inet(0x2, 0x80000, 0x10001) prctl$PR_SET_ENDIAN(0x14, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x2000, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) get_robust_list(r2, &(0x7f0000000580)=&(0x7f0000000240)={&(0x7f00000002c0)}, &(0x7f00000000c0)=0x342) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, 0x0) getpriority(0x0, r2) getsockname$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000003c0)=0x1c) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f00000001c0)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) rmdir(&(0x7f0000001700)='./file0\x00') close(r3) r4 = socket(0xb, 0x0, 0xff) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) syslog(0x9, &(0x7f0000000380)=""/51, 0xffffff47) r5 = syz_open_procfs(0x0, &(0x7f0000000740)="2f657865006832bf3fae766d1eff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568441006d7c0206a74e33326530000000000000000000000") sendfile(r4, r5, &(0x7f0000000180), 0x100000001) ioctl$UI_SET_KEYBIT(r5, 0x40045565, 0x1a7) getresgid(&(0x7f00000017c0), &(0x7f00000053c0), 0x0) 10:24:56 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8cff7cf9080000003545204c696e7578"], 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) [ 196.551327] ip6_tunnel: ip6tnl2 xmit: Local address not yet configured! [ 196.630174] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 10:24:57 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:57 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 10:24:57 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'memory'}]}, 0x8) fremovexattr(r0, &(0x7f0000000080)=@random={'system.', '\\{**\x00'}) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) ioctl(r0, 0x20, &(0x7f0000000180)="bfddfa16d8db547c4e8d82eb8ecc82901b00437107ee8726750581ed5c3f5acdeddeb018401042f22a08d70af25d596d2f424ec09fa66037f9f8d6cd4fa4a3210e1cbb1f205268afbccfc5b2c3fb7eba8fd22ac4fd2c7b7edbf89f75c802108db4bfd318c00932fea47a681c3cd9dab8c5c6576d2ac099792fffdb057e21d3b9f99e3f6b499c136bc79ebf52f562c2e2a3e9728ff6937fb20a89310ef12c8fc32f9ec7b434897f9f8e9563d00d830fb74be25134953b4ae35f3ef2a91d8ab9cee338d092f1e02586c5296650e67f7569c173bfc19ee47e7bbf") unshare(0x100) r1 = getpid() r2 = syz_open_procfs$namespace(r1, &(0x7f0000000280)='ns/mnt\x00') getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000002c0)={@broadcast, @local, 0x0}, &(0x7f0000000300)=0xc) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/keycreate\x00', 0x2, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='fuseblk\x00', 0x40040, &(0x7f0000000440)='\x00') ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000480)=""/227) r4 = syz_open_procfs(r1, &(0x7f0000000580)='attr/prev\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000600)={'syz_tun\x00', &(0x7f00000005c0)=@ethtool_eee={0x0, 0x2, 0x8, 0x10000, 0x401, 0x60000, 0x8, 0xffffffffffff0001, [0x401, 0x5]}}) io_setup(0x9df, &(0x7f0000000640)=0x0) io_cancel(r5, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0xb, 0x3, r0, &(0x7f0000000680)="1a4b955329a8cc728cc8d9820d0a41f488f9a722bca0e43e06404a1a05b9826a", 0x20, 0x5, 0x0, 0x3, r4}, &(0x7f0000000700)) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000740)={0xb28, {{0x2, 0x4e23, @multicast2}}}, 0x88) write$9p(r4, &(0x7f0000000800)="d72cf5dd10cb19e1f63aeed8951829d017", 0x11) r6 = accept(r4, &(0x7f0000000840)=@alg, &(0x7f00000008c0)=0x80) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000900)=[@timestamp, @mss={0x2, 0x7}], 0x2) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000000d80)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000d40)={&(0x7f00000009c0)={0x348, r7, 0x400, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x130, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r3}, {0x170, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xe52d}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x97bf}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}]}}]}, 0x348}, 0x1, 0x0, 0x0, 0x50}, 0x800) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000dc0)={0x0, r2, 0x40, 0x80000001, 0xa8a, 0x8001}) write$cgroup_pid(r0, &(0x7f0000000e00)=r1, 0x12) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000e40)={0x7, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e20, @empty}}}, 0x108) r8 = add_key(&(0x7f0000000f80)='cifs.idmap\x00', &(0x7f0000000fc0)={'syz', 0x1}, &(0x7f0000001000)="b46ad5581e23b5f1db1ab3b1e1fd9335f67896330da5a72098679eb7b2edc78719eb5f4985631fdd4fd5d2fecdd2d1248e703219cad1f692378e54522fdccf44954838dd6e75637db226b572a158d80d55868402a62f86462201672f0b87260f13ea34429f70a297ce96bf54dcc5697933a0204e86c3d586167c60516e2e758e1b38d9b1b16e51d5b756a3b4ea3c5c5bc877", 0x92, 0xfffffffffffffff9) r9 = add_key(&(0x7f00000010c0)='syzkaller\x00', &(0x7f0000001100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r10 = request_key(&(0x7f0000001140)='asymmetric\x00', &(0x7f0000001180)={'syz', 0x0}, &(0x7f00000011c0)='lb_port_stats\x00', 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000001200)={r8, r9, r10}, &(0x7f0000001240)=""/79, 0x4f, 0x0) 10:24:57 executing program 4: ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000000)) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ftruncate(r2, 0xbb1) open(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x20011, 0xffffffffffffffff, 0x2000000000000) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 10:24:57 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) pwritev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="48463cc5bf9966b87cfef1644e8775d2c8783753818b", 0x16}, {&(0x7f0000000040)="87f7e6a7b036f4892d8dd90358583e1ec8ca86edde0d6eac0152b6b68ad0a0716b07f8e105bfffe95ff75d55d0962481ec18db503083f4c77e9446cba5e2e8a993ba08e7d267a0b8572c13160b2f2d7b320c434459edeb", 0x57}, {&(0x7f0000000100)="28d956aeb4079b67b24cce7847854fb1b2db1a58e45633eda021eb9ae9a854ac7a2ad2da9429543fe2ba5a405bb0733f365ed3e1e1004b83a28e7340607facc83068cfe99ce58232099390a7cd07a8f1b98c2b79eb4765938e405142f1555992a297427aebda6dfd9593ab30dd767efc0ecc358e68d035c32e3cb8d3949daf6458600ea4f0cca601cf58b025e7e9baae961a92811c47fea9cce9c0d7f574ba98e01022c648efd921c8f0c132469fd50932eb1831ab45a6a7bd2a6521a8af4a30542dd3b93c4dcaaeb52e0569206cd80eea43ddf832d3171459f21fce00df7799a078a77e9a9ed4be7773fb642d82e3dd", 0xf0}, {&(0x7f00000002c0)="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", 0xfa}], 0x4, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) 10:24:57 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:57 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000100)=[r1]) 10:24:57 executing program 5: r0 = gettid() ptrace$getregs(0xffffffffffffffff, r0, 0x6, &(0x7f0000000140)=""/109) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x80, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, 0x0) r2 = creat(&(0x7f0000000200)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x1, 0x0) r4 = getpid() ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000100)=r4) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000280)={0x0, @aes256, 0x0, "8431d8dca56f8b67"}) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0xd) write$selinux_access(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563715f723a74657465785f646174615f743a73302073797374656d5b753a73797374653e9e439e6d5f723a6b65726e656c5f743a73302030303030303030303030c12abe176672"], 0x54) syz_emit_ethernet(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, [0x114, 0x25, 0x0, 0x530]}) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r5, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r6 = syz_open_dev$binder(0x0, 0x0, 0x2) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000600), 0x1, 0x0, &(0x7f00000000c0)="e1"}) openat$cgroup_ro(r2, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) 10:24:57 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x3, &(0x7f0000000080)=""/109, 0x6d) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000040)=0xe8) lchown(&(0x7f0000000000)='./file0\x00', r1, 0x0) 10:24:57 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:57 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/load\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='%\\}cpuset\x00'}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000180)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) write$selinux_load(r0, &(0x7f0000000000)={0xf97cff8c, 0x8, 'SE Linux'}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000000c0)=0x442, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) 10:24:57 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:57 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchownat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) ioctl$TIOCOUTQ(r1, 0x5411, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 10:24:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001fa) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x4, &(0x7f0000000540)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x48}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 10:24:57 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x40000) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) iopl(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x30) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) fcntl$getflags(r0, 0xb) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r1) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000140)=0x7, 0x4) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 197.409863] ================================================================== [ 197.417301] BUG: KASAN: use-after-free in get_disk+0xb7/0xd0 [ 197.423094] Read of size 8 at addr ffff88819bd1eb30 by task blkid/8625 [ 197.429747] [ 197.431369] CPU: 1 PID: 8625 Comm: blkid Not tainted 4.14.86+ #16 [ 197.437584] Call Trace: [ 197.440160] dump_stack+0xb9/0x11b [ 197.443696] print_address_description+0x60/0x22b [ 197.448531] kasan_report.cold.6+0x11b/0x2dd [ 197.452972] ? get_disk+0xb7/0xd0 [ 197.456439] get_disk+0xb7/0xd0 [ 197.459708] get_gendisk+0xe4/0x230 [ 197.463328] __blkdev_get+0x345/0xe50 [ 197.467128] ? __blkdev_put+0x6e0/0x6e0 [ 197.471114] ? bdget+0x426/0x4f0 [ 197.474478] blkdev_get+0x97/0x8c0 [ 197.478030] ? bd_may_claim+0xe0/0xe0 [ 197.481832] ? bd_acquire+0x149/0x2c0 [ 197.485647] ? lock_downgrade+0x560/0x560 [ 197.489778] ? lock_acquire+0x10f/0x380 [ 197.493745] ? bd_acquire+0x113/0x2c0 [ 197.497550] blkdev_open+0x1bd/0x240 [ 197.501258] ? security_file_open+0x88/0x190 [ 197.505660] do_dentry_open+0x426/0xda0 [ 197.509620] ? bd_acquire+0x2c0/0x2c0 [ 197.513424] vfs_open+0x11c/0x210 [ 197.516872] path_openat+0x5f9/0x2930 [ 197.520670] ? path_mountpoint+0x9a0/0x9a0 [ 197.524915] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 197.529402] ? trace_hardirqs_on+0x10/0x10 [ 197.533654] do_filp_open+0x197/0x270 [ 197.537440] ? may_open_dev+0xd0/0xd0 [ 197.541242] ? _raw_spin_unlock+0x29/0x40 [ 197.545383] do_sys_open+0x2ef/0x580 [ 197.549105] ? filp_open+0x60/0x60 [ 197.552633] ? up_read+0x17/0x30 [ 197.556003] ? __do_page_fault+0x64c/0xb60 [ 197.560228] ? do_syscall_64+0x43/0x4b0 [ 197.564186] ? do_sys_open+0x580/0x580 [ 197.568058] do_syscall_64+0x19b/0x4b0 [ 197.571942] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.577113] RIP: 0033:0x7f057fec3120 [ 197.580833] RSP: 002b:00007ffced5a2198 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 197.588524] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f057fec3120 [ 197.595777] RDX: 00007ffced5a2f1a RSI: 0000000000000000 RDI: 00007ffced5a2f1a [ 197.603036] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 197.610321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000f65030 [ 197.617574] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 197.624848] [ 197.626458] Allocated by task 8581: [ 197.630071] kasan_kmalloc.part.1+0x4f/0xd0 [ 197.634383] kmem_cache_alloc_trace+0x138/0x300 [ 197.639036] alloc_disk_node+0x5f/0x3b0 [ 197.643018] loop_add+0x3e9/0x840 [ 197.646467] loop_control_ioctl+0x12e/0x310 [ 197.650790] do_vfs_ioctl+0x1a0/0x1030 [ 197.654675] SyS_ioctl+0x7e/0xb0 [ 197.658021] do_syscall_64+0x19b/0x4b0 [ 197.661907] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.667086] [ 197.668732] Freed by task 1842: [ 197.671999] kasan_slab_free+0xac/0x190 [ 197.675958] kfree+0xf5/0x310 [ 197.679058] device_release+0xf4/0x1a0 [ 197.682931] kobject_put+0x146/0x200 [ 197.686704] put_disk+0x1f/0x30 [ 197.690015] __blkdev_get+0x564/0xe50 [ 197.693833] blkdev_get+0x97/0x8c0 [ 197.697356] blkdev_open+0x1bd/0x240 [ 197.701092] do_dentry_open+0x426/0xda0 [ 197.705052] vfs_open+0x11c/0x210 [ 197.708508] path_openat+0x5f9/0x2930 [ 197.712297] do_filp_open+0x197/0x270 [ 197.716082] do_sys_open+0x2ef/0x580 [ 197.719780] do_syscall_64+0x19b/0x4b0 [ 197.723648] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.728846] [ 197.730470] The buggy address belongs to the object at ffff88819bd1e600 [ 197.730470] which belongs to the cache kmalloc-2048 of size 2048 [ 197.743291] The buggy address is located 1328 bytes inside of [ 197.743291] 2048-byte region [ffff88819bd1e600, ffff88819bd1ee00) [ 197.755320] The buggy address belongs to the page: [ 197.760236] page:ffffea00066f4600 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 197.770216] flags: 0x4000000000008100(slab|head) [ 197.774977] raw: 4000000000008100 0000000000000000 0000000000000000 00000001000f000f [ 197.782854] raw: ffffea0006744c00 0000000300000003 ffff8881da802800 0000000000000000 [ 197.790719] page dumped because: kasan: bad access detected [ 197.796410] [ 197.798021] Memory state around the buggy address: [ 197.802933] ffff88819bd1ea00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.810303] ffff88819bd1ea80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.817643] >ffff88819bd1eb00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.824992] ^ [ 197.829909] ffff88819bd1eb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.837251] ffff88819bd1ec00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.844591] ================================================================== [ 197.851963] Disabling lock debugging due to kernel taint [ 197.858216] Kernel panic - not syncing: panic_on_warn set ... [ 197.858216] [ 197.865653] CPU: 1 PID: 8625 Comm: blkid Tainted: G B 4.14.86+ #16 [ 197.873109] Call Trace: [ 197.875684] dump_stack+0xb9/0x11b [ 197.879217] panic+0x1bf/0x3a4 [ 197.882419] ? add_taint.cold.4+0x16/0x16 [ 197.886565] kasan_end_report+0x43/0x49 [ 197.890565] kasan_report.cold.6+0x77/0x2dd [ 197.894887] ? get_disk+0xb7/0xd0 [ 197.898337] get_disk+0xb7/0xd0 [ 197.901648] get_gendisk+0xe4/0x230 [ 197.905306] __blkdev_get+0x345/0xe50 [ 197.909115] ? __blkdev_put+0x6e0/0x6e0 [ 197.913089] ? bdget+0x426/0x4f0 [ 197.916465] blkdev_get+0x97/0x8c0 [ 197.920009] ? bd_may_claim+0xe0/0xe0 [ 197.923818] ? bd_acquire+0x149/0x2c0 [ 197.927608] ? lock_downgrade+0x560/0x560 [ 197.931754] ? lock_acquire+0x10f/0x380 [ 197.935716] ? bd_acquire+0x113/0x2c0 [ 197.939518] blkdev_open+0x1bd/0x240 [ 197.943235] ? security_file_open+0x88/0x190 [ 197.947626] do_dentry_open+0x426/0xda0 [ 197.951581] ? bd_acquire+0x2c0/0x2c0 [ 197.955372] vfs_open+0x11c/0x210 [ 197.958813] path_openat+0x5f9/0x2930 [ 197.962636] ? path_mountpoint+0x9a0/0x9a0 [ 197.966860] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 197.971346] ? trace_hardirqs_on+0x10/0x10 [ 197.975582] do_filp_open+0x197/0x270 [ 197.979368] ? may_open_dev+0xd0/0xd0 [ 197.983163] ? _raw_spin_unlock+0x29/0x40 [ 197.987300] do_sys_open+0x2ef/0x580 [ 197.991011] ? filp_open+0x60/0x60 [ 197.994552] ? up_read+0x17/0x30 [ 197.997907] ? __do_page_fault+0x64c/0xb60 [ 198.002127] ? do_syscall_64+0x43/0x4b0 [ 198.006081] ? do_sys_open+0x580/0x580 [ 198.009952] do_syscall_64+0x19b/0x4b0 [ 198.013826] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.019033] RIP: 0033:0x7f057fec3120 [ 198.022724] RSP: 002b:00007ffced5a2198 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 198.030412] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f057fec3120 [ 198.037664] RDX: 00007ffced5a2f1a RSI: 0000000000000000 RDI: 00007ffced5a2f1a [ 198.044915] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 198.052179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000f65030 [ 198.059431] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 198.067036] Kernel Offset: 0x31200000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 198.077997] Rebooting in 86400 seconds..