0}], 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=ANY=[]}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x3}) unshare(0x20600) geteuid() r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setregid(r2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000002c0)=0xc) setregid(0x0, 0x0) getresgid(&(0x7f0000000040), 0x0, 0x0) getgid() getresgid(&(0x7f0000000280), 0x0, &(0x7f0000000300)) setgroups(0x0, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r4], 0x4}, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) syz_genetlink_get_family_id$SEG6(0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x801, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x155bc) socket$nl_route(0x10, 0x3, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f0000000000)={0x0, 0x0}) 19:54:29 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 406.842562] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 406.918049] SELinux: failed to load policy 19:54:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440), 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:29 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:29 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:29 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/enforce\x00', 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="14e1b7", @ANYRES16=r0], 0x2}}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) open$dir(&(0x7f0000000480)='./file0\x00', 0x4000, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x4d6) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f0000000200)={{}, 0x0, 0x4}) write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x2, 0x0) gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000100)=@known='trusted.overlay.opaque\x00') fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="00e69600fca9e69643cbe284b2"], 0xd) fallocate(r4, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, &(0x7f0000000380), 0x0) lseek(r4, 0x0, 0x3) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000000c0)}, 0xbd96b9f073d96152) sendmsg$TIPC_NL_MON_GET(r4, 0x0, 0x4000021) sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40c4}, 0xe36a5a8a0dc1af38) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) setuid(r5) ioprio_set$uid(0x3, 0x0, 0x0) set_thread_area(0x0) socket$inet6(0xa, 0x40000000000001, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x10080, 0x24) 19:54:29 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:29 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 407.751329] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 407.795203] SELinux: failed to load policy 19:54:30 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, 0x0}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:30 executing program 0: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x100, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x2}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x4d6, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffe}}, 0xe8) rt_sigprocmask(0x0, &(0x7f0000000100)={0x6}, &(0x7f0000000180), 0x8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, 0x0, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x26, &(0x7f0000000340)={@rand_addr=0x9, @broadcast, @remote}, 0xc) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) r3 = socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x80000, 0x5) sendmsg$key(r3, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a989000000007ba79554354cdddb4e667263a7192ff58eb16f88b9663da5668b145e6313f3ee41e2f28204de687a25340b61976cae3a9a9e90785afd31885d362411ef23cd8fef4aa6dac6acb5ded04e5435e7a3bfaab8d914916ee79d501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a0000000000000000000000781f1a3ea4c057bfc8af28e2b90e1d3dd7de6e38d2d29be9a5adffffff7f00000000428958b132e07900"], 0x10}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) ioctl$TCSETSW(r4, 0x5403, &(0x7f0000000100)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100008, 0x0, 0x0, 0x7fffffff}) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0xffffff78) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe84b}) syz_open_pts(r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 19:54:30 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:30 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 408.143920] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:30 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 408.190773] SELinux: failed to load policy 19:54:30 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, 0x0}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:30 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:30 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 408.457387] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 408.487808] SELinux: failed to load policy 19:54:30 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:30 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, 0x0) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, 0x0}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:30 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 408.771821] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 408.816009] SELinux: failed to load policy 19:54:31 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x200006, 0x1, 0x0, 0x0, 0x1}) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140)=0x5, 0x4) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000040)={0x0, 0x10000}) 19:54:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:31 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 409.192076] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 409.240556] SELinux: failed to load policy 19:54:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x10004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x8838, 0x0, 0x0, 0x9, 0xfffffffffffffffd, 0x800}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000), 0x0, 0x1a0}]) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.stat\x00', 0x26e1, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x200000001, 0x3, 0x2000000000000009, 0x2, 0x0, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000012c0)={r3}, 0xc) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={r3, 0x3f, 0x8}, 0xfffffffffffffcec) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) r6 = dup(r5) ppoll(&(0x7f0000000500)=[{r1, 0x20}, {r4, 0x90}, {r1, 0x2000}, {r1, 0x500}, {r6, 0x140}], 0x2, &(0x7f0000000440)={0x77359400}, 0x0, 0xffffffe7) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2cda9d9aa2396801, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @perf_bp={0x0}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="540000000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) geteuid() r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000002c0)=@req={0x28, &(0x7f00000003c0)={'veth1_to_team\x00', @ifru_map={0x401, 0x2, 0x1, 0x5, 0x3a, 0x8}}}) sendmsg$nl_route(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="0300780d008100000000000084ddd05fc1f36fc4646489f4f66e98821316e00e6e730ed03be482692fd74879d2d55f201c64622175ba178167d5946f58c12f019c7533cbd83f244fc6bc16a6908640a5ee02158033191314538724914f6f7a1a9f917714b920ae7be738f30afb6ca6c3a886dd5d296ab3be20842775a0eea66ea5355b4bf7a88af65b6dd2e50124249a936f28b7968da2691e"], 0x28}}, 0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r10, 0x0, 0x4, 0x0, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x333, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') r11 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r11) 19:54:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:31 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) 19:54:31 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, 0x0) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:31 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r3 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r6, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(r10, 0x4c82) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r11) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r11) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r11) r12 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r13 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r14 = ioctl$LOOP_CTL_GET_FREE(r13, 0x4c82) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r14) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r14) ioctl$LOOP_CTL_REMOVE(r12, 0x4c81, r14) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r16 = ioctl$LOOP_CTL_GET_FREE(r15, 0x4c82) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, r16) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r16) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r8) syncfs(r6) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:31 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) [ 409.502074] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 409.531978] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:31 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, 0x0) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 409.583597] SELinux: failed to load policy 19:54:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:32 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 409.800856] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 409.835919] SELinux: failed to load policy 19:54:32 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:32 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r3 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r6, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(r10, 0x4c82) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r11) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r11) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r11) r12 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r13 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r14 = ioctl$LOOP_CTL_GET_FREE(r13, 0x4c82) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r14) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r14) ioctl$LOOP_CTL_REMOVE(r12, 0x4c81, r14) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r16 = ioctl$LOOP_CTL_GET_FREE(r15, 0x4c82) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, r16) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r16) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r8) syncfs(r6) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:32 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, 0x0) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 410.239416] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 19:54:32 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) 19:54:32 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:32 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, 0x0) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:32 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) 19:54:32 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 410.478248] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 410.490562] SELinux: failed to load policy 19:54:32 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r3 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r6, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(r10, 0x4c82) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r11) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r11) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r11) r12 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r13 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r14 = ioctl$LOOP_CTL_GET_FREE(r13, 0x4c82) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r14) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r14) ioctl$LOOP_CTL_REMOVE(r12, 0x4c81, r14) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r16 = ioctl$LOOP_CTL_GET_FREE(r15, 0x4c82) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, r16) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r16) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r8) syncfs(r6) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:32 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0xdb69, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="390000001100090468fe0f0000003ddd4c00ff3f03", 0xfffffffffffffcd8}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 19:54:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:33 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) 19:54:33 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) 19:54:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x2a5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x271ea3ad, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x141c2) r0 = memfd_create(&(0x7f00000001c0)='nodev\x00', 0x3) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0) pwritev(r0, &(0x7f0000000340), 0x0, 0x81805) creat(0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@allocspi={0xf8, 0x16, 0x317, 0x0, 0x0, {{{@in6=@empty}, {@in6=@remote, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x70bd26}}}, 0xf8}}, 0x0) [ 410.795124] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 410.823895] SELinux: failed to load policy [ 410.853239] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.0'. [ 410.869386] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22422 comm=syz-executor.0 19:54:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 410.917715] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22422 comm=syz-executor.0 [ 410.954330] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22422 comm=syz-executor.0 19:54:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0xfffffffe}, 0x8, 0x10, &(0x7f0000000000)={0x1}, 0x10}, 0x70) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = dup(r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000140)={r2, r3/1000+30000}, 0x10) getresuid(0x0, 0x0, &(0x7f0000000300)) exit(0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000000c0)) 19:54:33 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) [ 410.969142] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22422 comm=syz-executor.0 [ 410.983355] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22422 comm=syz-executor.0 19:54:33 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:33 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 411.019876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22422 comm=syz-executor.0 19:54:33 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) [ 411.102415] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22422 comm=syz-executor.0 [ 411.128454] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:33 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 411.141322] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22422 comm=syz-executor.0 [ 411.158569] SELinux: failed to load policy [ 411.176781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22422 comm=syz-executor.0 [ 411.223034] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22422 comm=syz-executor.0 19:54:33 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0xfffffffe}, 0x8, 0x10, &(0x7f0000000000)={0x1}, 0x10}, 0x70) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = dup(r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000140)={r2, r3/1000+30000}, 0x10) getresuid(0x0, 0x0, &(0x7f0000000300)) exit(0x0) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f00000000c0)) 19:54:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[]}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:33 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:33 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) socket$inet6(0xa, 0x802, 0x0) 19:54:33 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:33 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) 19:54:33 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:33 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:33 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:33 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:33 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) [ 411.596044] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 411.617232] SELinux: failed to load policy 19:54:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[]}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:34 executing program 4: syz_open_dev$loop(0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f00000008c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000440)={0x0, 0x290, 0x0, 0x1, 0x0, 0x0, 0x800}, 0xc97d155b76ca2077) pipe(&(0x7f0000000340)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="40000000100005000081ff000000000000000000d7317cff041ae01093504ec3c3c910677c2156b68a543608312c3330156b4270598bc1f31dbabde1", @ANYRES32=0x0, @ANYRES16, @ANYRES32], 0x4}}, 0x0) dup3(r1, r3, 0x80000) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) r4 = socket(0x10, 0x0, 0xc) sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="12564acb", @ANYRES16=0x0, @ANYBLOB="00022cbd7000fedbdf25070000000800050000000000"], 0x1c}}, 0x800) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, 0x0, 0x0, 0x0, 0x0, 0xb2) write$binfmt_misc(r5, &(0x7f00000004c0)={'syz1', "bd028e5c5c3ea515de87a1d679e4240205d8052e58c1855e925d36e668c1b9546c765fe72ac2944275e7419d27ff09e4eff6191e0b6a70abdbfae2b7f327340ae991cd3c"}, 0x48) accept4$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0, 0x800) socket$nl_xfrm(0x10, 0x3, 0x6) r6 = dup(0xffffffffffffffff) sendmsg$IPVS_CMD_FLUSH(r6, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x20010400}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)={0x3c, 0x0, 0x200, 0x0, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffe00}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20044000}, 0x4d8c0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4044013) 19:54:34 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0xfffffffffffffff5, &(0x7f0000000000)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@broadcast, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000e40)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000009d40)={0x0, 0x0, &(0x7f0000009d00)={&(0x7f0000000840)=ANY=[@ANYBLOB='\x00', @ANYBLOB, @ANYBLOB="38000100240001", @ANYBLOB, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000038000100240001006d636173745f72656a", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400fffbffff3c00010024000100656e61626c656400"/85, @ANYBLOB, @ANYRES32, @ANYBLOB="93619926caf7b079f83441d53ba9f6c8aa2e503a3c874fbcc51913058a8ab93f5e9f1960b0fb5d191839cc0959d3743a771bd8df12f956ff08c9398980", @ANYRES32, @ANYBLOB="c8"], 0xf}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000080), 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@broadcast, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000009d40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) [ 411.888945] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 411.922785] SELinux: failed to load policy 19:54:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[]}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:34 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:34 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:34 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6f, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0x3, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) fcntl$setlease(r1, 0x400, 0x1) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)={{0x2, 0x1, 0x7, 0x2, 0x8}, 0xd8eb, 0xeb5, 0x5556c176}) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x64980, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) [ 412.165466] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 412.195741] SELinux: failed to load policy 19:54:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 412.459574] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 412.488499] SELinux: failed to load policy 19:54:34 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:34 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:34 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:34 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:35 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 412.729007] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 412.739447] SELinux: failed to load policy 19:54:35 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:35 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:35 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:35 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:35 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x35a, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000400)=@xdp, 0x80, &(0x7f0000000600)=[{&(0x7f0000000480)=""/227, 0xe3}, {&(0x7f0000000580)=""/116, 0x74}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, 0x0, 0x66}, 0x2}], 0x1, 0x20000, &(0x7f00000006c0)={0x0, 0x989680}) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESOCT, @ANYRES32, @ANYBLOB="e6c5ebf5c5932eec510100019b3d7280437a7462010000000000000029a741efca44"], 0x0, 0x3d}, 0x20) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 413.075799] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:35 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:35 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:35 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648a"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:35 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:35 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:35 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 413.324562] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:35 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:35 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:35 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648a"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 413.550770] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:38 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r0, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648a"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:38 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:38 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r0, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 416.145414] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:38 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 416.186976] sel_write_load: 3 callbacks suppressed [ 416.187014] SELinux: failed to load policy 19:54:38 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, 0xffffffffffffffff, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r0, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648aef503ecdc58301b20e029e9cc5fc31ecdd8ae6a28ccbd30d280ddee651b75a6c6fdb63adf6e7b44a9280188c74cbd69d1e68c497b0065131e61d9435a27b29b208ee6ec792c9c633ad9f"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:38 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ashmem\x00', 0x400, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) fcntl$setpipe(r4, 0x407, 0x6) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x151, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) syz_emit_ethernet(0x82, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60d8652b004c0000fe8000000000000000000000000000bbfe8000000000000000000000000000aa00000000000000000420880b0000000000000800040086dd080088be00fcff00100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 19:54:38 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:38 executing program 4: setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) socketpair(0x2, 0x401, 0x4, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000100)=0x8001, 0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x220}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x1e28ba722dce2e00, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x54}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x26}, 0x11) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000002c0)=[@sack_perm], 0x1) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000300)) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000340)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f0000000380)) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r5, &(0x7f00000006c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10004816}, 0xc, &(0x7f0000000680)={&(0x7f0000000540)={0x124, r6, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="8009854fb810c63985017391a7f89aa6"}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast1}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x30000}, 0x40001) capget(&(0x7f0000000700)={0x19980330}, &(0x7f0000000740)={0x400000, 0x2, 0x69, 0x80, 0x1000}) r7 = syz_genetlink_get_family_id$fou(&(0x7f00000007c0)='fou\x00') sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x160000180}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x28, r7, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @initdev={0xac, 0x1e, 0x0, 0x0}}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x92) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000008c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r8, 0xc0145401, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x9, 0x1, 0x7fffffff}) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000980)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000940), 0xc, &(0x7f0000000e40)={&(0x7f00000009c0)={0x444, r9, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8a}]}, @TIPC_NLA_BEARER={0x154, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x26}}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4b6a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb3c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'bond_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xaa3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x25}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xac}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffff81}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffe9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa554}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0xfc, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc8a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4b98d2a2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @loopback, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7f}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x6, @empty, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff3b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_team\x00'}}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffff801}]}, @TIPC_NLA_LINK={0x4}]}, 0x444}, 0x1, 0x0, 0x0, 0x85}, 0x80) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000f00)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f40)={0x50, r10, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x50}, 0x1, 0x0, 0x0, 0x20}, 0x800) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000001040)={0x2, 0x80, 0x0, 0xfffff001, 0xffffffff}) r11 = dup(0xffffffffffffffff) dup(r11) openat$tun(0xffffffffffffff9c, &(0x7f0000001080)='/dev/net/tun\x00', 0x4100, 0x0) r12 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000010c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r12, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, r2, 0x20, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x64809) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r12, 0x6, 0x21, &(0x7f0000001200)="5f04d61d61cf5b845e3aa3e40614d0ed", 0x10) 19:54:38 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 416.482554] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 416.522408] SELinux: failed to load policy [ 416.538868] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 19:54:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648aef503ecdc58301b20e029e9cc5fc31ecdd8ae6a28ccbd30d280ddee651b75a6c6fdb63adf6e7b44a9280188c74cbd69d1e68c497b0065131e61d9435a27b29b208ee6ec792c9c633ad9f"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0x3f, 0x0, 0x3ef, 0x7, 0x7}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @remote}}, 0x1c) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) inotify_init1(0x0) r3 = socket(0x4, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r4 = gettid() r5 = syz_open_procfs(r4, &(0x7f0000000080)='net/packet\x00') sendfile(r0, r5, 0x0, 0xedc0) [ 416.727626] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:39 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 416.781289] SELinux: failed to load policy 19:54:39 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648aef503ecdc58301b20e029e9cc5fc31ecdd8ae6a28ccbd30d280ddee651b75a6c6fdb63adf6e7b44a9280188c74cbd69d1e68c497b0065131e61d9435a27b29b208ee6ec792c9c633ad9f"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:39 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:39 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 416.956544] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 416.967872] SELinux: failed to load policy 19:54:39 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ashmem\x00', 0x400, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) fcntl$setpipe(r4, 0x407, 0x6) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x151, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) syz_emit_ethernet(0x82, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60d8652b004c0000fe8000000000000000000000000000bbfe8000000000000000000000000000aa00000000000000000420880b0000000000000800040086dd080088be00fcff00100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 19:54:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:39 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:39 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:39 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(0xffffffffffffffff, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:39 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:39 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) setreuid(0x0, 0x0) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:39 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 417.474898] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 417.487582] SELinux: failed to load policy 19:54:39 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) setreuid(0x0, 0x0) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:39 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(0xffffffffffffffff, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:40 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(0xffffffffffffffff, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 417.692581] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 417.704337] SELinux: failed to load policy 19:54:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ashmem\x00', 0x400, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) fcntl$setpipe(r4, 0x407, 0x6) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x151, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) syz_emit_ethernet(0x82, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60d8652b004c0000fe8000000000000000000000000000bbfe8000000000000000000000000000aa00000000000000000420880b0000000000000800040086dd080088be00fcff00100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 19:54:40 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) setreuid(0x0, 0x0) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:40 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:40 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:40 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r0, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648aef503ecdc58301b20e029e9cc5fc31ecdd8ae6a28ccbd30d280ddee651b75a6c6fdb63adf6e7b44a9280188c74cbd69d1e68c497b0065131e61d9435a27b29b208ee6ec792c9c633ad9f14103283361269c2cf2505d0e2e11d4356f415c9137cc6af0d5db7d2cc1534c31bf0c0e62c"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:40 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:40 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:40 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r0, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 418.360313] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 418.377120] SELinux: failed to load policy 19:54:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:40 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:40 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 418.722035] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 418.742909] SELinux: failed to load policy 19:54:41 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:41 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r0, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:41 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:41 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:41 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:41 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 419.248969] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 419.288229] SELinux: failed to load policy 19:54:41 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:41 executing program 0: ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000200)=""/174) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x111140, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x10000000000004, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x2f) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r1, &(0x7f00000017c0), 0x35a, 0x0) faccessat(r1, &(0x7f0000000300)='./file0\x00', 0x104, 0x800) recvmmsg(r1, &(0x7f0000000640)=[{{&(0x7f0000000400)=@xdp, 0x80, &(0x7f0000000600)=[{&(0x7f0000000480)=""/227, 0xe3}, {&(0x7f0000000580)=""/116, 0x74}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, 0x0, 0x66}, 0x2}], 0x1, 0x20000, &(0x7f00000006c0)={0x0, 0x989680}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r2, &(0x7f00000017c0), 0x35a, 0x0) recvmmsg(r2, &(0x7f0000000640)=[{{&(0x7f0000000400)=@xdp, 0x80, &(0x7f0000000600)=[{&(0x7f0000000480)=""/227, 0xe3}, {&(0x7f0000000580)=""/116, 0x74}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, 0x0, 0x66}, 0x2}], 0x1, 0x20000, &(0x7f00000006c0)={0x0, 0x989680}) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f00000002c0)=""/23) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) clock_settime(0x5, &(0x7f0000000140)={r4, r5+30000000}) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0xfffffffffffffe17, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) 19:54:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:41 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:42 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:42 executing program 0: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0xffffffffffffffff, r4, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000840)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="0c007a0008009300", @ANYRES32=r3, @ANYBLOB="24ddcc21d9a14706c88aeb4b79173d7a095b186a0caf7767501652c1f5b602065490685c0be0fb32860946bd0da947f72d39dea0c3659a58f028d8c7eb7afae25b379f6c2fc8ef2cc5fdab05c61204821c070d9690b9fa619e9a3d208f4b402615d7d5f1cd177e02a50b468e074bdf4e6b3aae5c7c25e5975930683f9953ccea34e13c000233191569050d86817da7a75ff94a451af05b24e3de6c6e1f412600"], 0x204}, 0x1, 0x0, 0x0, 0x20000800}, 0x58085) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TCSETX(0xffffffffffffffff, 0x5433, &(0x7f0000000240)={0x0, 0x0, [0x4, 0x2, 0xfffc, 0x8, 0x2], 0xdc}) r6 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') ioctl$sock_FIOGETOWN(r6, 0x8903, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)="a20d07000000", 0x6}, {&(0x7f0000000300)="60fe70883c79bf8bfb56ba99e8696ff4b96adfda08995496a34c1af6e11f05d90ccd8492061426b34583e0d5a946b0db2b77addc8ee020927b8db784ef37", 0x3e}, {&(0x7f00000003c0)="14af744d7de009a379b7a300e8ad263044a612cf8654770f996b6e20c407608cdbd305b93cfa44fae09e83c96bf668cb1c14876e1cf95726e855f217a0f5326f476d91b6", 0x44}], 0x3) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='\x00\x00\x00 \xdf\x00\x03\x00\x04', 0x9) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0xc, 0x100800, 0x6) sendto$inet(r5, &(0x7f0000000340)="7d4b7e8c1710e5252817df6f0abe7fd667a3e467ae18533190a0418d", 0x1c, 0x24040801, 0x0, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000940)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRESDEC=r8, @ANYBLOB="00fb958c6fffffff000000000800010068745fd665b0951c62001c00020018000200030000001a000000000000000000c5d050f4d5d2fd9900c8faa2d004badf14b6cc1e61c7ad62c3749f8fa24ff69cc3246cee4290226d8441f0f2c3a9e727b4d9711f8e03d808eed79b000000"], 0x3}}, 0x0) [ 419.659693] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 419.702444] SELinux: failed to load policy 19:54:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:42 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:42 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:42 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:42 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 420.035820] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:42 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:42 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:42 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:42 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:42 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:42 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) getitimer(0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x80000, 0x7) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') getpeername$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='memory.current\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000340)={0x1}) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x9) r4 = memfd_create(&(0x7f00000002c0)='\x00'/10, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x200000001, 0x3, 0x2000000000000009, 0x2, 0x0, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r5, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000012c0)={r6}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r6, 0x5, 0x30}, 0xc) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r8, &(0x7f00000017c0), 0x35a, 0x0) recvmmsg(r8, &(0x7f0000000640)=[{{&(0x7f0000000400)=@xdp, 0x80, &(0x7f0000000600)=[{&(0x7f0000000480)=""/227, 0xe3}, {&(0x7f0000000580)=""/116, 0x74}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, 0x0, 0x66}, 0x2}], 0x1, 0x20000, &(0x7f00000006c0)={0x0, 0x989680}) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="9c20083f9faecb47f42483c0", @ANYRESOCT, @ANYRESOCT=r7, @ANYRESDEC=r8], 0xffffffffffffff33) execveat(r4, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x60242, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)=r9) syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r10 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000140)=0x2001403c) [ 420.305298] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:42 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:42 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)=0x1) 19:54:42 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:43 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendmsg$NET_DM_CMD_START(r2, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x9010}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x6020001}, 0x4001) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r3, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000540)='#! ', &(0x7f0000000580)) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) get_thread_area(&(0x7f0000000780)={0x7ff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1}) io_setup(0x6, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') socket(0x10, 0x3, 0x0) r5 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x11, r4, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) ioctl$VT_GETSTATE(r6, 0x5603, &(0x7f00000000c0)={0x3ff, 0x4, 0x3}) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000008c0)={0xd4, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0163404000000000000000000000000000000000000000000200000000000000000000006800"/52, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="852a747000000000", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/190], @ANYBLOB="be0000000000000001000000000000003200000000000000852a646600000000", @ANYRES32, @ANYBLOB="000000000000000000000000852a567000850085000000200e5279c1933d52c28216ab0471b4d1c2f2a5a6200eee75e61ae38a35a3", @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYBLOB='\x00'/204], @ANYBLOB="cc0000000000000001fcffffffffffff2b00000000000000"], @ANYBLOB="00000000000000001063084000000000000000000f630c4000000000000000000000000003630840", @ANYRES64=r5, @ANYBLOB="0763044000000000066304400300000001634040010000000000000000000000000000000000000019000000000000000000000050000000000000001800000000000000", @ANYPTR=&(0x7f0000000900)=ANY=[@ANYBLOB="852a6873010100000100000000000000000000000000000085616466000000000a0000000000000000000000000000002400000000000000852a6873020000000300"/80], @ANYPTR=&(0x7f0000000980)=ANY=[@ANYBLOB="000000000000000018000000000000003800000000000000"], @ANYBLOB="0963104000"/20], 0x6c, 0x0, &(0x7f00000006c0)="689d2032e5f036fa20857a41aaae960251ab496d282adcf222d012c43fb9b3e2956f24d20adefabbf3a98b877392b286d987c7ed92be4402e1612a70a78651de8b2a8bf15227877458799c1b8e6684207c8ddab237e3a0a5083ea023e59d20e80c5644fd500610db2b0177b4"}) r7 = request_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000380)='net/mcfilter\x00', r3) add_key(&(0x7f0000000100)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r7) [ 420.688469] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:43 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:43 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)=0x1) 19:54:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:43 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'veth0\x00', 0x201a}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00\x00\x00\f\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="489592572ca0aed6de1b4bc6da12572c", 0x0, r3}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r6, &(0x7f00000017c0), 0x35a, 0x0) recvmmsg(r6, &(0x7f0000000640)=[{{&(0x7f0000000400)=@xdp, 0x80, &(0x7f0000000600)=[{&(0x7f0000000480)=""/227, 0xe3}, {&(0x7f0000000580)=""/116, 0x74}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, 0x0, 0x66}, 0x2}], 0x1, 0x20000, &(0x7f00000006c0)={0x0, 0x989680}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r6, 0x10, &(0x7f00000002c0)={&(0x7f0000000280)=""/30, 0x1e}}, 0x10) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0xb4) connect$inet6(r5, &(0x7f0000000080), 0x1c) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r9}]]}}}]}, 0x38}}, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x308, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 19:54:43 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:43 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 421.096537] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 421.120362] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:54:43 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)=0x1) 19:54:43 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 421.139244] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:43 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:43 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 421.229711] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 19:54:43 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:43 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:43 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)=0x1) 19:54:43 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8, 0x6d2}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f0000000a40)}, 0x2}, {{0x0, 0x0, &(0x7f0000001c40), 0x0, &(0x7f0000001c80)=""/105, 0x69}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xc6, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd601806ff0090880000000000000000000000ffffac1e0101ff020000000000000000000000000001000404020000000000000000000000000000000000000000ff0100000000f100000000000000000100040000000000006c0081716500000067070000000000000100050200000502000300010000010005020800072000000009060006000000000000000200000000000000000002000000000000000502000000000000000000004e23045190783e3fe3260133bd25"], 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 19:54:43 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:43 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x1000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5}, 0x2eb}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x40, 0x40000) ioctl$EVIOCSABS2F(r5, 0x401845ef, &(0x7f00000001c0)={0x7f, 0x4, 0x8, 0x7ff, 0x80, 0x2}) [ 421.500234] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 421.512204] sel_write_load: 4 callbacks suppressed [ 421.512209] SELinux: failed to load policy 19:54:43 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648aef503ecdc58301b20e029e9cc5fc31ecdd8ae6a28ccbd30d280ddee651b75a6c6fdb63adf6e7b44a9280188c74cbd69d1e68c497b0065131e61d9435a27b29b208ee6ec792c9c633ad9f14103283361269c2cf2505d0e2e11d4356f415c9137cc6af0d5db7d2cc1534c31bf0c0e62ceae12100b69de2b7e5aaf8f87ca885e2bb08838fd4c9f0bcac8abbf295aa2d12"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xfffffffffffffffd, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) fcntl$setstatus(r1, 0x4, 0x44800) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0xfffc, r1, &(0x7f0000000500), 0x0, 0x600}]) io_submit(r2, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x70, 0x8, 0x6, 0xfe, 0x5, 0x0, 0x8000000000001fe, 0x90000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7fff, 0x3, @perf_bp={&(0x7f00000005c0), 0x4}, 0x10, 0xa1, 0x0, 0x4, 0x6, 0x806, 0x3b}, r4, 0x8, r0, 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(r5, &(0x7f0000000340)='net/udplite\x00') setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) write(r6, &(0x7f00000003c0)="40ed2e62d2fd4dd0835c58b451fa7d5d4bb5dd61342f593e6649109658d79c3b00ee96cb10fc0a26aff37186bbe23f4651cce23df73fe91102895981050e6b469b6a9f5c7cfd8f9f2124902b31b51be0052456dac20add26dffad37c4c5774372bb474e196e5f2b36998ae79fec8b7f1e019f46dfab208cf0da0029ba1df3c0432f499f950ee6665afe613ee26530000e1ff0000000000000000000000600c560197240a3340b100b119087328d6cf7c58add6bea6eb1ef95aa57df98c049baabb9753cac47aaedc81a4627babc5fa", 0xcf) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x6100) ftruncate(r7, 0x8200) write$cgroup_type(r7, &(0x7f0000000200)='threaded\x00', 0x175d900f) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x5) openat$cgroup_procs(r7, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x7}, 0x7) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) rt_sigqueueinfo(r8, 0x21, &(0x7f0000000200)={0x1c, 0x4, 0x7}) r9 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000380)='\x00\b\x00\x00\x00\x00\x00\x00\xff\x01\x00', 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', 0x0, 0x0) [ 421.789513] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 421.826349] SELinux: failed to load policy 19:54:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:44 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:44 executing program 4: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 422.114833] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 422.146535] SELinux: failed to load policy 19:54:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0xff, 0xca, 0x0, 0x0, 0xffffffff}) r1 = syz_open_pts(r0, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) add_key$keyring(&(0x7f0000000440)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000340)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 19:54:44 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 422.384459] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 422.395821] SELinux: failed to load policy 19:54:44 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:44 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:44 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:44 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 422.658097] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 422.680639] SELinux: failed to load policy 19:54:45 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:45 executing program 4: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:45 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:45 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 422.898136] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 422.927719] SELinux: failed to load policy 19:54:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:45 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:45 executing program 4: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:45 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:45 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:45 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x8, 0x4, 0x0, r1}) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@can={0x1d, 0x0}, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000380)={@loopback, @remote, @dev={0xfe, 0x80, [], 0x25}, 0x0, 0x4, 0x0, 0x400, 0x0, 0x0, r4}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r4}, @IFLA_LINKINFO={0x2c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @empty}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r3}]]}}}]}, 0x54}}, 0x28038095) 19:54:45 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 423.369843] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 423.391291] SELinux: failed to load policy 19:54:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648aef503ecdc58301b20e029e9cc5fc31ecdd8ae6a28ccbd30d280ddee651b75a6c6fdb63adf6e7b44a9280188c74cbd69d1e68c497b0065131e61d9435a27b29b208ee6ec792c9c633ad9f14103283361269c2cf2505d0e2e11d4356f415c9137cc6af0d5db7d2cc1534c31bf0c0e62ceae12100b69de2b7e5aaf8f87ca885e2bb08838fd4c9f0bcac8abbf295aa2d1278f2b3"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:45 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="460000002800070f3200000800367700fbff020002000000", 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES64=r3, @ANYRESDEC, @ANYRESHEX], 0x32) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 423.621456] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.0'. [ 423.645972] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 423.660486] SELinux: failed to load policy [ 423.666689] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.0'. 19:54:46 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:46 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x0) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:46 executing program 4: pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) mount$bpf(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x2000, &(0x7f0000000580)={[{@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x1b7a}}, {@mode={'mode', 0x3d, 0x80000000}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x3f40}}, {@mode={'mode', 0x3d, 0xc35a}}, {@mode={'mode', 0x3d, 0x10000}}], [{@fsmagic={'fsmagic', 0x3d, 0xf}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x30, 0x37, 0x63, 0x66, 0x0, 0x39, 0x35], 0x2d, [0x0, 0x37, 0x32, 0x62], 0x2d, [0x0, 0x65, 0x0, 0x64], 0x2d, [0x0, 0x0, 0x36], 0x2d, [0x33, 0x63, 0x65, 0x63, 0x771139b6ae453fbd, 0x18, 0x5b, 0x63]}}}, {@pcr={'pcr', 0x3d, 0x1d}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '-'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@euid_lt={'euid<', r0}}]}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000a80), 0xfffffffffffffffd) munlockall() r1 = socket$inet(0x2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)=0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') getpeername$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) r4 = perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x1ee6b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x53d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0xffffffffffffffff, r4, 0x0) r5 = syz_open_procfs(r2, &(0x7f0000000040)='net/anycast6\x00') accept4$unix(r5, &(0x7f0000000080)=@abs, &(0x7f0000000280)=0x6e, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x54}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r7, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r7, 0x11, 0x64, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000002c0)=@req={0x28, &(0x7f0000000240)={'eql\x00', @ifru_settings={0x0, 0x0, @te1=0x0}}}) 19:54:46 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 423.884025] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 423.900680] SELinux: failed to load policy 19:54:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x0) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 424.138746] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 424.164223] SELinux: failed to load policy 19:54:46 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000b80)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) lookup_dcookie(0x0, &(0x7f00000000c0), 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='attr/sockcreate\x00') mkdir(0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r4, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)=0x10) write$binfmt_elf64(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x14) fallocate(r4, 0x3, 0x0, 0x8020003) writev(r4, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) lseek(r4, 0x0, 0x3) r5 = dup(0xffffffffffffffff) r6 = socket(0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000034c0)={@local, @mcast2, @empty, 0x0, 0x40, 0x0, 0x100, 0x0, 0x206}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000680)) sendmsg$TIPC_NL_MEDIA_GET(r6, 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r5, 0x0, 0x8800) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10006804}, 0xc, &(0x7f0000000400)}, 0x0) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000600)={0xfffffffffffffffe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40081}, 0x4000021) 19:54:46 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:46 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:46 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:46 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:46 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x0) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:46 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:47 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 424.765773] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:47 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:47 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648aef503ecdc58301b20e029e9cc5fc31ecdd8ae6a28ccbd30d280ddee651b75a6c6fdb63adf6e7b44a9280188c74cbd69d1e68c497b0065131e61d9435a27b29b208ee6ec792c9c633ad9f14103283361269c2cf2505d0e2e11d4356f415c9137cc6af0d5db7d2cc1534c31bf0c0e62ceae12100b69de2b7e5aaf8f87ca885e2bb08838fd4c9f0bcac8abbf295aa2d1278f2b3db"], 0x1}], 0x1}, 0x20000000) r6 = creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 425.053059] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:47 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:47 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:47 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648aef503ecdc58301b20e029e9cc5fc31ecdd8ae6a28ccbd30d280ddee651b75a6c6fdb63adf6e7b44a9280188c74cbd69d1e68c497b0065131e61d9435a27b29b208ee6ec792c9c633ad9f14103283361269c2cf2505d0e2e11d4356f415c9137cc6af0d5db7d2cc1534c31bf0c0e62ceae12100b69de2b7e5aaf8f87ca885e2bb08838fd4c9f0bcac8abbf295aa2d1278f2b3db"], 0x1}], 0x1}, 0x0) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:47 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 425.382012] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:47 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:47 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 425.445447] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648aef503ecdc58301b20e029e9cc5fc31ecdd8ae6a28ccbd30d280ddee651b75a6c6fdb63adf6e7b44a9280188c74cbd69d1e68c497b0065131e61d9435a27b29b208ee6ec792c9c633ad9f14103283361269c2cf2505d0e2e11d4356f415c9137cc6af0d5db7d2cc1534c31bf0c0e62ceae12100b69de2b7e5aaf8f87ca885e2bb08838fd4c9f0bcac8abbf295aa2d1278f2b3db"], 0x1}], 0x1}, 0x20000000) r6 = creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:47 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 425.703237] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 425.875072] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:48 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(0xffffffffffffffff, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:48 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(0xffffffffffffffff, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r3 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r6, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(r10, 0x4c82) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r11) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r11) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r11) r12 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r13 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r14 = ioctl$LOOP_CTL_GET_FREE(r13, 0x4c82) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r14) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r14) ioctl$LOOP_CTL_REMOVE(r12, 0x4c81, r14) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r16 = ioctl$LOOP_CTL_GET_FREE(r15, 0x4c82) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, r16) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r16) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r8) syncfs(r6) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:48 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 426.175894] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:48 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:48 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(0xffffffffffffffff, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(0xffffffffffffffff, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 426.467047] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:48 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r0, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:48 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(0xffffffffffffffff, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r3 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r6, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(r10, 0x4c82) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r11) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r11) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r11) r12 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r13 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r14 = ioctl$LOOP_CTL_GET_FREE(r13, 0x4c82) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r14) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r14) ioctl$LOOP_CTL_REMOVE(r12, 0x4c81, r14) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r16 = ioctl$LOOP_CTL_GET_FREE(r15, 0x4c82) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, r16) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r16) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r8) syncfs(r6) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:49 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r0, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(0xffffffffffffffff, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) pread64(0xffffffffffffffff, &(0x7f0000000280)=""/220, 0xdc, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r0, r4, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 426.798609] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:49 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 426.840195] sel_write_load: 8 callbacks suppressed [ 426.840234] SELinux: failed to load policy 19:54:49 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:49 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r3 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r6, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r8) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(r10, 0x4c82) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r11) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r11) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r11) r12 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r13 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r14 = ioctl$LOOP_CTL_GET_FREE(r13, 0x4c82) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r14) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r14) ioctl$LOOP_CTL_REMOVE(r12, 0x4c81, r14) r15 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r16 = ioctl$LOOP_CTL_GET_FREE(r15, 0x4c82) ioctl$LOOP_CTL_REMOVE(r15, 0x4c81, r16) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r16) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r16) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r8) syncfs(r6) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:49 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:49 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x108000400000003a) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) pipe(&(0x7f0000000400)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast1, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20040010) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000001540)={@rand_addr="0eb9cc911ee05f7f7d5778c719429c2a"}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) r5 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000b80)=ANY=[@ANYRES16=r5, @ANYBLOB="000028bd7000fddbdf2506000000100007000c00040001040000000000002000050008000100696200000c00020008000200000000000800010065746800240009000800020007000000080002"], 0x2}, 0x1, 0x0, 0x0, 0x800}, 0x4018000) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xffffffffffffff5d, &(0x7f0000000100)={&(0x7f0000000700)=ANY=[@ANYRES16=r5, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x8ae883315bf4b92a}, 0x10000090) getgid() r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') getpeername$packet(r6, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) dup(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) r10 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r10, &(0x7f0000000880)=ANY=[@ANYBLOB="2321202e2f66696c6530200a7b65d9ec32eefd1001251e725e0802d121010100000000000000f36ed3f68580872caee21ea47ede4f1be6c52304318993d1874dadba21630639562d7f5d44d96e9775ccae73baf934fad9d4feb7d5ba5566430d606511cd88ab233c48f7da11fca74210241a60e2f07b0f4a56b70f24f49ac699e1409b4c06fefd71"], 0xc) close(r10) open(&(0x7f0000000680)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x80, 0x60) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x1000) r11 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) lstat(&(0x7f0000000bc0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r9, r12, r13) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000000)) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 427.312156] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 427.326844] SELinux: failed to load policy 19:54:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="10000000370000042bbd7000fddbdf25b8767c0a7b6f4deddf89f02b62073cf1b5968d5c56ab3a6eaf4ba8f3ec250fb5ae6d17e45f3cd4712fbf839bea702aa8b0e80a21757c029aff00701f6105b77925616bdb4c4b901a409d942e9cc61726022b2653f863b1c1ce9ddcdbc41e5a0fc606d67af7656fa3a75a7aafc5992aa6997999002900670bf992abda60a023778d648aef503ecdc58301b20e029e9cc5fc31ecdd8ae6a28ccbd30d280ddee651b75a6c6fdb63adf6e7b44a9280188c74cbd69d1e68c497b0065131e61d9435a27b29b208ee6ec792c9c633ad9f14103283361269c2cf2505d0e2e11d4356f415c9137cc6af0d5db7d2cc1534c31bf0c0e62ceae12100b69de2b7e5aaf8f87ca885e2bb08838fd4c9f0bcac8abbf295aa2d1278f2b3db"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:49 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:50 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:50 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 427.651422] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 427.662547] SELinux: failed to load policy 19:54:50 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:50 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:50 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:50 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:50 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:50 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 428.088052] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:50 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:50 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:50 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket(0x100000000000011, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f000000cc80)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x87ffd) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r3, &(0x7f00000017c0), 0x35a, 0x0) recvmmsg(r3, &(0x7f0000000640)=[{{&(0x7f0000000400)=@xdp, 0x80, &(0x7f0000000600)=[{&(0x7f0000000480)=""/227, 0xe3}, {&(0x7f0000000580)=""/116, 0x74}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, 0x0, 0x66}, 0x2}], 0x1, 0x20000, &(0x7f00000006c0)={0x0, 0x989680}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfffffffffffffbff, r3, 0x8) sendfile(r0, r2, 0x0, 0x800000000021) [ 428.129882] SELinux: failed to load policy 19:54:50 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:50 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff0300540000552331fe0500fac9067f13675ab4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') perf_event_open(&(0x7f00000002c0)={0x5, 0x411, 0x0, 0x9, 0x1f, 0xbf, 0x0, 0x7f, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x40000000000020}, 0x2409, 0x8000, 0x8, 0x2, 0x0, 0x8, 0x97}, 0x0, 0x3, r2, 0x2) r4 = syz_open_procfs(0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') getpeername$packet(r5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000340)={0x3, 0x70, 0xff, 0x0, 0x2, 0xff, 0x0, 0x4, 0x1000, 0xc9b95691be9cce9b, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x0, 0x7fffffff}, 0x1000, 0x8, 0x8, 0x8, 0xf9f, 0x10000000, 0xd9}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r3, r4}, 0x10) ioctl$PPPIOCCONNECT(r3, 0x4004743a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r6 = getpid() tgkill(0xffffffffffffffff, r6, 0x6) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_mtu(r7, 0x29, 0x17, &(0x7f0000000600), &(0x7f0000000640)=0x4) r8 = syz_open_procfs(0x0, 0x0) write$P9_RSTAT(r8, &(0x7f00000001c0)=ANY=[@ANYBLOB="620000007d0200251961991207d95b000500c9590000a80306000000081e000000000000000004010000315192b748899a952a7490b800010001003feef23100000000"], 0x43b) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, 0x0, 0x0) 19:54:50 executing program 4: ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendfile(r2, r3, 0x0, 0x1000005) sendto$inet6(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x80, 0x0, 0x0) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e23, 0xfffffff9, @mcast1, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7ff}}, 0x100) rt_sigprocmask(0x0, &(0x7f0000000100), &(0x7f0000000180), 0x8) epoll_pwait(r0, &(0x7f0000000380)=[{}, {}], 0x2, 0x7f, &(0x7f0000000400)={0xba5}, 0x8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a989000000007ba79554354cdddb4e667263a7192ff58eb16f88b9663d94668b145e6313f3ee41e2f28204de687a25340b06dc49c0f873cc53785afd31885d362411ef23cd8fef4aa6dac6acb5ded04e5435e7a3bfaab8d914916ee79d501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a0000000000000000000000781f1a3ea4c057bfc8af28e2b90e1d3dd7de6e38d2d29be9a5adffffff7f00000000328958b132e07900"], 0x10}}, 0x0) creat(&(0x7f00000003c0)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000100)=0x0) gettid() io_submit(r5, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0xffffff78) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x43, &(0x7f0000000300), &(0x7f0000000340)=0x10) syz_open_pts(0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:54:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 428.440569] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 428.477076] SELinux: failed to load policy 19:54:50 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:50 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:50 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 428.758812] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 428.795635] SELinux: failed to load policy 19:54:51 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(0x0, 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[], 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 428.961897] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 428.998985] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 19:54:51 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 429.038967] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 429.077808] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 429.102286] SELinux: failed to load policy 19:54:51 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 429.122820] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 19:54:51 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:51 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff0300540000552331fe0500fac9067f13675ab4f2", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/packet\x00') perf_event_open(&(0x7f00000002c0)={0x5, 0x411, 0x0, 0x9, 0x1f, 0xbf, 0x0, 0x7f, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x40000000000020}, 0x2409, 0x8000, 0x8, 0x2, 0x0, 0x8, 0x97}, 0x0, 0x3, r2, 0x2) r4 = syz_open_procfs(0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') getpeername$packet(r5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000340)={0x3, 0x70, 0xff, 0x0, 0x2, 0xff, 0x0, 0x4, 0x1000, 0xc9b95691be9cce9b, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x0, 0x7fffffff}, 0x1000, 0x8, 0x8, 0x8, 0xf9f, 0x10000000, 0xd9}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r3, r4}, 0x10) ioctl$PPPIOCCONNECT(r3, 0x4004743a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r6 = getpid() tgkill(0xffffffffffffffff, r6, 0x6) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_procfs(0x0, 0x0) getsockopt$inet6_mtu(r7, 0x29, 0x17, &(0x7f0000000600), &(0x7f0000000640)=0x4) r8 = syz_open_procfs(0x0, 0x0) write$P9_RSTAT(r8, &(0x7f00000001c0)=ANY=[@ANYBLOB="620000007d0200251961991207d95b000500c9590000a80306000000081e000000000000000004010000315192b748899a952a7490b800010001003feef23100000000"], 0x43b) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, 0x0, 0x0) 19:54:51 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(0x0, 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[], 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:51 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:51 executing program 4: syz_open_pts(0xffffffffffffffff, 0x40) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 429.556237] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 429.590647] SELinux: failed to load policy 19:54:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[], 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:52 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:52 executing program 3: pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[], 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:52 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(0x0, 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 429.786695] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 429.797694] SELinux: failed to load policy [ 429.891643] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 429.912964] SELinux: failed to load policy [ 429.953671] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 429.965286] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 429.974559] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock 19:54:52 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:52 executing program 3: pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 430.003568] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 19:54:52 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:52 executing program 3: pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:52 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:52 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 430.177908] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:52 executing program 4: pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(0x0, 0xffffff59, &(0x7f0000000440)={0x77359400}, 0x0, 0xff9b) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x54}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) geteuid() r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x200000002, 0x0) getsockopt(0xffffffffffffffff, 0x80, 0x9, &(0x7f00000017c0)=""/163, &(0x7f00000006c0)=0xa3) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000000), 0x4) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f00000003c0)=0x3, 0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000080)='veth1_to_hsr\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r4, &(0x7f00000017c0), 0x35a, 0x0) clock_gettime(0x0, &(0x7f0000000680)) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000000640)=[{{&(0x7f0000000400)=@xdp, 0x80, &(0x7f0000000600)=[{&(0x7f0000000480)=""/227, 0xe3}, {&(0x7f0000000580)=""/116, 0x74}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x1176, 0x0, 0xffffffffffffffe9}, 0x12}], 0x1, 0x20000, &(0x7f0000000380)={r5, r6+30000000}) ioctl$TIOCLINUX6(r4, 0x541c, &(0x7f00000000c0)={0x6, 0x7f}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000002c0)=@req={0x28, &(0x7f0000000240)={'eql\x00', @ifru_settings={0x0, 0x0, @te1=0x0}}}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b00000000008c5349b9f4bdc9b1fa8b95169ba0dd50b7eb0df68b71d75eee8d32529a8cff9b4cfef9efa785dfef3c5d91247dc09be7eeae0e8a6eb54a5010f929d35b73db3e70d8f0df300a4f1878ae9b0c5a952addf039fdf65f5eea7622866a2ffab5f1922036706b8d8d8aabc37e68e595bb1bcc35424e3f4d576d2ecd7983304b459e5d57dc3f4092dc54a05ca50e0f4dc0822dcb7c32bda51883be21d15f2800"], 0x28}}, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f00000002c0)=""/32) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000300)) 19:54:52 executing program 0: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:52 executing program 3: syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000000c0)=0xfffffe0e) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)=ANY=[@ANYBLOB="185c7ffe74bf381bc3f60b81eedb64add42ae2fc7bffbcb311a7392fb7641b31daeedc334acd9c6d7d9db1ecd45f0876c3e7a75c13958ea37311460597acc31ad9", @ANYPTR], 0x2) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="dfcc7567b0cae0bfe672c567204efd185786e7262217f6cee2791499d989e07017e5b1cf22d9942e7eb582ecf88e9bf368c5bfe5bde2735e8ea55d73359c6d9190b0457c7ae393fb7dbe857fb67b11a7372a48e327a6d056b23040bec4178906b527fb8e91af69a464312c58f2ac40fa20b120359613dfa88de4ae677f8427ae87233d52c205b386025cb2086d430e48ca08806232a571b0737bc9ec9d6958f99e0597ba48b81b447d6882906aa5e4fd7ee7bc21b37d", @ANYPTR], 0x2) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001280)='/selinux/status\x00', 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000000)="6dd56f6ae6ea49478c44", 0xa}, {&(0x7f0000000140)="e9b112fbb28b435e4fa52aab3f62df9d6de5d9899296f554145363", 0x1b}], 0x2) r5 = dup(0xffffffffffffffff) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r5, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYRES16=r6, @ANYBLOB="000028bd7000000000000a000000380005000800010075647000240002000800030053ff0000080001000c0000e9070003003f0000000800040000"], 0x2}}, 0x8800) sendmsg$TIPC_NL_BEARER_SET(r4, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="08010000", @ANYRES16=r6, @ANYBLOB="000426bd7000fcdbdf25050000000c00070008000100000001002c00070008000200000000000c000300080000000000000008000100050000000c000300aa000000000000005c0004001400010062726f6164636173742d6c696e6b00000c00012973797a31000000000c00070008000300010000000c00010073797a30000000001400010062726f6164636173742d6c696e6b00000c00010073797a3100000000300004000c00010073797a31000000000c00010073797a30000000001400010062726f6164636173742d6c696e6b00002400090008000100000000000800020003000000080001001a32986c08000200004800000c0001000800030000000000"], 0x108}, 0x1, 0x0, 0x0, 0x40c4}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000001440)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001400)={&(0x7f0000001480)=ANY=[@ANYBLOB="c4000000", @ANYRES16=r6, @ANYBLOB="000329bd7000ffdbdf25140000001c000100100001007564703a73797a30000000000800030009000000280005002400020008000400560000000800030004000000080004000200000008000400cd0f0900006c0001000800030007000000100001007564703a73797a3000000000240002000800030001800000080002000100000008000200a200000008000300ff0100001000010069623a7663616e30000000001400020008000400bd95000008000300ce0000000800030004000000"], 0xc4}, 0x1, 0x0, 0x0, 0x800}, 0x40000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x5c3, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r8 = socket(0x10, 0x800000000000803, 0x0) sendto(r8, &(0x7f0000000000)="120000001600e70d017b00d473fc00000000", 0x12, 0x0, 0x0, 0xffffffffffffff32) recvmmsg(r8, &(0x7f0000001ac0)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000140)=""/126, 0x7e}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./bus\x00', 0x28) sendmsg$TIPC_NL_NET_GET(r8, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000001580)={0x19c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xef3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8e70}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xed}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4670}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xea}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x9, @empty, 0x7ff}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x4, @remote, 0x7fff}}}}]}]}, 0x19c}}, 0x8000) [ 430.591085] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 430.697763] selinux_nlmsg_perm: 3 callbacks suppressed [ 430.697785] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23774 comm=syz-executor.0 [ 430.738874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23783 comm=syz-executor.0 19:54:53 executing program 3: syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:53 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:53 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:53 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffbfffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000000)) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000280)='\x00') r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x28000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r2, 0x1}, 0x10) 19:54:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000000c0)=0xfffffe0e) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000180)=ANY=[@ANYBLOB="185c7ffe74bf381bc3f60b81eedb64add42ae2fc7bffbcb311a7392fb7641b31daeedc334acd9c6d7d9db1ecd45f0876c3e7a75c13958ea37311460597acc31ad9", @ANYPTR], 0x2) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="dfcc7567b0cae0bfe672c567204efd185786e7262217f6cee2791499d989e07017e5b1cf22d9942e7eb582ecf88e9bf368c5bfe5bde2735e8ea55d73359c6d9190b0457c7ae393fb7dbe857fb67b11a7372a48e327a6d056b23040bec4178906b527fb8e91af69a464312c58f2ac40fa20b120359613dfa88de4ae677f8427ae87233d52c205b386025cb2086d430e48ca08806232a571b0737bc9ec9d6958f99e0597ba48b81b447d6882906aa5e4fd7ee7bc21b37d", @ANYPTR], 0x2) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001280)='/selinux/status\x00', 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) writev(r4, &(0x7f00000001c0)=[{&(0x7f0000000000)="6dd56f6ae6ea49478c44", 0xa}, {&(0x7f0000000140)="e9b112fbb28b435e4fa52aab3f62df9d6de5d9899296f554145363", 0x1b}], 0x2) r5 = dup(0xffffffffffffffff) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r5, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYRES16=r6, @ANYBLOB="000028bd7000000000000a000000380005000800010075647000240002000800030053ff0000080001000c0000e9070003003f0000000800040000"], 0x2}}, 0x8800) sendmsg$TIPC_NL_BEARER_SET(r4, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="08010000", @ANYRES16=r6, @ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x40c4}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000001440)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001400)={&(0x7f0000001480)=ANY=[@ANYBLOB="c4000000", @ANYRES16=r6, @ANYBLOB="000329bd7000ffdbdf25140000001c000100100001007564703a73797a30000000000800030009000000280005002400020008000400560000000800030004000000080004000200000008000400cd0f0900006c0001000800030007000000100001007564703a73797a3000000000240002000800030001800000080002000100000008000200a200000008000300ff0100001000010069623a7663616e30000000001400020008000400bd95000008000300ce0000000800030004000000"], 0xc4}, 0x1, 0x0, 0x0, 0x800}, 0x40000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x5c3, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) r8 = socket(0x10, 0x800000000000803, 0x0) sendto(r8, &(0x7f0000000000)="120000001600e70d017b00d473fc00000000", 0x12, 0x0, 0x0, 0xffffffffffffff32) recvmmsg(r8, &(0x7f0000001ac0)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000000140)=""/126, 0x7e}], 0x2}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) mkdir(&(0x7f0000000240)='./bus\x00', 0x28) sendmsg$TIPC_NL_NET_GET(r8, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000001580)={0x19c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x4}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'caif0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xef3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8e70}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xed}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4670}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xea}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x9, @empty, 0x7ff}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x4, @remote, 0x7fff}}}}]}]}, 0x19c}}, 0x8000) [ 430.939448] audit: type=1400 audit(1572983693.268:103): avc: denied { map } for pid=23788 comm="syz-executor.4" path="/dev/ashmem" dev="devtmpfs" ino=5461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 430.971541] [ 430.973214] ====================================================== [ 430.979600] WARNING: possible circular locking dependency detected [ 430.985941] 4.14.151+ #0 Not tainted [ 430.990154] ------------------------------------------------------ [ 430.997605] syz-executor.4/23792 is trying to acquire lock: [ 431.004675] (&sb->s_type->i_mutex_key#10){+.+.}, at: [<000000008d04ed0d>] shmem_fallocate+0x150/0xae0 [ 431.014189] [ 431.014189] but task is already holding lock: [ 431.020167] (ashmem_mutex){+.+.}, at: [<00000000a8ec01e6>] ashmem_shrink_scan+0x53/0x4f0 [ 431.029359] [ 431.029359] which lock already depends on the new lock. [ 431.029359] [ 431.041681] [ 431.041681] the existing dependency chain (in reverse order) is: [ 431.050473] [ 431.050473] -> #2 (ashmem_mutex){+.+.}: [ 431.055939] __mutex_lock+0xf7/0x13e0 [ 431.060248] ashmem_mmap+0x4c/0x450 [ 431.064380] mmap_region+0x7d9/0xfb0 [ 431.068593] do_mmap+0x548/0xb80 [ 431.072463] vm_mmap_pgoff+0x177/0x1c0 [ 431.076967] SyS_mmap_pgoff+0xf4/0x1b0 [ 431.081384] do_syscall_64+0x19b/0x520 [ 431.085788] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 431.091482] [ 431.091482] -> #1 (&mm->mmap_sem){++++}: [ 431.097017] down_read+0x37/0xa0 [ 431.100895] __do_page_fault+0x8a4/0xbb0 [ 431.105471] page_fault+0x22/0x50 [ 431.109429] iov_iter_fault_in_readable+0x162/0x350 [ 431.114972] generic_perform_write+0x158/0x460 [ 431.120068] __generic_file_write_iter+0x32e/0x550 [ 431.125517] generic_file_write_iter+0x36f/0x650 [ 431.130806] __vfs_write+0x401/0x5a0 [ 431.135030] vfs_write+0x17f/0x4d0 [ 431.139365] SyS_pwrite64+0x136/0x160 [ 431.143700] do_syscall_64+0x19b/0x520 [ 431.148817] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 431.154515] [ 431.154515] -> #0 (&sb->s_type->i_mutex_key#10){+.+.}: [ 431.161282] lock_acquire+0x12b/0x360 [ 431.165594] down_write+0x34/0x90 [ 431.169554] shmem_fallocate+0x150/0xae0 [ 431.174135] ashmem_shrink_scan+0x1ca/0x4f0 [ 431.178977] ashmem_ioctl+0x2b4/0xd20 [ 431.183314] do_vfs_ioctl+0xabe/0x1040 [ 431.189060] SyS_ioctl+0x7f/0xb0 [ 431.192956] do_syscall_64+0x19b/0x520 [ 431.197360] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 431.203059] [ 431.203059] other info that might help us debug this: [ 431.203059] [ 431.211201] Chain exists of: [ 431.211201] &sb->s_type->i_mutex_key#10 --> &mm->mmap_sem --> ashmem_mutex [ 431.211201] [ 431.222768] Possible unsafe locking scenario: [ 431.222768] [ 431.229571] CPU0 CPU1 [ 431.234228] ---- ---- [ 431.238879] lock(ashmem_mutex); [ 431.242344] lock(&mm->mmap_sem); [ 431.248406] lock(ashmem_mutex); [ 431.254357] lock(&sb->s_type->i_mutex_key#10); [ 431.259093] [ 431.259093] *** DEADLOCK *** [ 431.259093] [ 431.265132] 1 lock held by syz-executor.4/23792: [ 431.269864] #0: (ashmem_mutex){+.+.}, at: [<00000000a8ec01e6>] ashmem_shrink_scan+0x53/0x4f0 [ 431.278609] [ 431.278609] stack backtrace: [ 431.283088] CPU: 0 PID: 23792 Comm: syz-executor.4 Not tainted 4.14.151+ #0 [ 431.290252] Call Trace: [ 431.292829] dump_stack+0xca/0x134 [ 431.296376] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 431.301725] __lock_acquire+0x2f5f/0x4320 [ 431.305869] ? perf_trace_lock_acquire+0x122/0x4e0 [ 431.310782] ? trace_hardirqs_on+0x10/0x10 [ 431.314999] ? perf_trace_lock_acquire+0x122/0x4e0 [ 431.319911] ? trace_hardirqs_on+0x10/0x10 [ 431.324127] ? perf_trace_lock_acquire+0x122/0x4e0 [ 431.329037] lock_acquire+0x12b/0x360 [ 431.332842] ? shmem_fallocate+0x150/0xae0 [ 431.337061] down_write+0x34/0x90 [ 431.340493] ? shmem_fallocate+0x150/0xae0 [ 431.344708] shmem_fallocate+0x150/0xae0 [ 431.348757] ? lock_acquire+0x12b/0x360 [ 431.352716] ? avc_has_perm_noaudit+0x8b/0x2d0 [ 431.357312] ? shmem_setattr+0x7a0/0x7a0 [ 431.361395] ? perf_trace_lock_acquire+0x122/0x4e0 [ 431.366337] ? HARDIRQ_verbose+0x10/0x10 [ 431.370391] ? avc_has_extended_perms+0x5e0/0xc20 [ 431.375245] ? lock_acquire+0x12b/0x360 [ 431.379362] ? ashmem_shrink_scan+0x53/0x4f0 [ 431.383803] ashmem_shrink_scan+0x1ca/0x4f0 [ 431.388141] ashmem_ioctl+0x2b4/0xd20 [ 431.392017] ? trace_hardirqs_on+0x10/0x10 [ 431.396393] ? check_preemption_disabled+0x35/0x1f0 [ 431.401420] ? perf_trace_lock_acquire+0x122/0x4e0 [ 431.406342] ? ashmem_shrink_scan+0x4f0/0x4f0 [ 431.410911] ? ashmem_shrink_scan+0x4f0/0x4f0 [ 431.415402] do_vfs_ioctl+0xabe/0x1040 [ 431.419490] ? selinux_file_ioctl+0x426/0x590 [ 431.423966] ? selinux_file_ioctl+0x116/0x590 [ 431.428448] ? ioctl_preallocate+0x1e0/0x1e0 [ 431.432866] ? selinux_socket_sock_rcv_skb+0x610/0x610 [ 431.438125] ? __fget+0x210/0x370 [ 431.441560] ? lock_downgrade+0x630/0x630 [ 431.446392] ? lock_acquire+0x12b/0x360 [ 431.450365] ? check_preemption_disabled+0x35/0x1f0 [ 431.455376] ? check_preemption_disabled+0x35/0x1f0 [ 431.460418] ? security_file_ioctl+0x7c/0xb0 [ 431.464831] SyS_ioctl+0x7f/0xb0 [ 431.468576] ? do_vfs_ioctl+0x1040/0x1040 [ 431.472728] do_syscall_64+0x19b/0x520 [ 431.476891] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 431.482092] RIP: 0033:0x45a219 19:54:53 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 431.485270] RSP: 002b:00007fdb2f71ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 431.492966] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 431.500222] RDX: 0000000000000000 RSI: 000000000000770a RDI: 0000000000000004 [ 431.507595] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 431.514857] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdb2f71b6d4 [ 431.522129] R13: 00000000004c198d R14: 00000000004d5668 R15: 00000000ffffffff 19:54:53 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:54 executing program 3: syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:54 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:54 executing program 0: syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 431.669217] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23794 comm=syz-executor.0 [ 431.694835] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c 19:54:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:54 executing program 0: syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:54 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:54 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:54 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:54 executing program 0: syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:54 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 432.066031] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 432.098111] sel_write_load: 3 callbacks suppressed [ 432.098124] SELinux: failed to load policy [ 432.129968] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 432.158217] SELinux: failed to load policy 19:54:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:54 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:54 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:54 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:54 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 432.398229] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 432.442832] SELinux: failed to load policy 19:54:55 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:55 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$EVIOCGMTSLOTS(r9, 0x8040450a, &(0x7f0000001580)=""/275) r10 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:55 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:55 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:55 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 432.886929] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 432.907812] SELinux: failed to load policy 19:54:55 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') 19:54:55 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f0000001580)=""/275) r8 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:55 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:55 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) [ 433.047613] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 433.084353] SELinux: failed to load policy 19:54:55 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 433.201310] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 433.225227] SELinux: failed to load policy 19:54:55 executing program 3: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$EVIOCGMTSLOTS(r8, 0x8040450a, &(0x7f0000001580)=""/275) r9 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:55 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = request_key(&(0x7f0000000240)='id_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$netlink(r3, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfe, 0x4008001}, 0xc) keyctl$search(0xa, 0x0, &(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) pread64(r0, &(0x7f0000000280)=""/220, 0xdc, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @remote, 0xf8000000}, 0x1c) sendfile(r1, r5, 0x0, 0xa808) pipe(&(0x7f00000001c0)) socket$inet6(0xa, 0x802, 0x0) 19:54:55 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) 19:54:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x48) sched_setaffinity(0x0, 0xfffffffffffffcdb, &(0x7f0000000280)=0x400000000009) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) clone(0x300400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/net/pfkey\x00', 0xc0, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000007c0)={0x1000, 0x3, 0x1}) write$selinux_load(r2, &(0x7f0000000800)=ANY=[], 0x46d) fcntl$dupfd(r1, 0x0, r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[@ANYBLOB="7d1fc4a43bfbae6fc9b18430316aa19517a42dd18742b9ee46984c1e56e9c8b22eff63bfd53b8bd5ade18bcb7fead9b55a7d66f26d464121812070aa3ed7714b0180000020e705c9290dc5457acb3d00000000000000153c297a951777942c31347debdb627a30a3be741a9160f0591b064789addb55e1c0af02000000dfabe96fa1de99ded786ec6abd654a5f0859fa0d3abd51c7b4625d05ab53c3d7fc4a7cdb7b1fb4b8891bd4941a09a81746489ad73cecae43e45831506b9181334f8a7303721b07482e400000007e9da50ceb14a91f3714852bbe13cbebbfbadb6852e7364a1fc20396e43631b2eb9fd4317c59404fa02f81eaf452235038a0c160da0ee6b0f13d6b130000000000"], 0xffffffffffffff40) fcntl$setstatus(r0, 0x4, 0x2002) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpid() r4 = creat(&(0x7f0000000080)='./bus\x00', 0x40) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x3555d4333e1c3495, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000300)) stat(&(0x7f0000000380)='./bus\x00', &(0x7f0000002080)) sendmsg$netlink(r4, &(0x7f0000002180)={&(0x7f0000000440)=@kern={0x10, 0x0, 0x0, 0xa1040200}, 0xc, &(0x7f00000004c0)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x20000000) r6 = creat(&(0x7f00000000c0)='./bus\x00', 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYRES64=r6], 0x8) socketpair$unix(0x1, 0x1, 0x0, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f0000001580)=""/275) r8 = request_key(&(0x7f0000000bc0)='\xd2\x04!\xb3user\x00\x98!\xc5P\x88w\x89\xe7h\xd8\xda\xa2\xa5\xb5Q f\x8c\xcf\x8e\xa8\xc4w\x9b\xed\xa1\x16p\xdbP\\t}\xc9Ik]\x84\x80!\x89\x93\x13EMR\xd0\x04\xac\xe2qb\xdc\xec\x9dI\xd0\xaf\x1b\xdb\xadO\x8f\x96\x8bg\'x\x1b\xf3\x03\xe9\x1f\x87\xce\xab\x05\xdaF\xaa6~Bc\x14\xe4\xec\xfb\x81\xd1-\xd6\xaf>\x10*\xd1\x1a\xc5\xb0e\x1b\x88k\xa4c\x7fs_y\x1a?\x9a]Wh\x9a\xe4\xa0f\bhe\x9f\x0fx\xa1B\xfb\x8dw\xc5\xda8\xec\xcbg\xfa\xe4\xde\xf5\x8f\x0f4E\xceB\x14|\xbf\x99\xd5[V\x85z\x90\xf1\xd7\xda\xd3Xa\xc0\xffj\xd3s\xa2\xdf\xc6\x8aP\xc1\x91\xda\x91\xc4\xb1\xbf\x87\xa2\xb1\xf2o\x96\t\x99d%>$\xd4\x0e\xde\x89\xc7\xf3\xd4^>\"\xd8\x9f\xcb\x8a\x1dmA\xea\xb0\xd6\xc0\xa8\xfa\x9d\xf4 \x15\xa6\xa6\xff\xbf\xb1\xae\xfc\xf6\xb9\\m*\xc7\x1a{)n', &(0x7f0000000e40)={'syz', 0x3}, &(0x7f0000000e80)='wlan0]\'\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000ec0)='user\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000600)="7a6e3adfbdf506b6710181eb630aa983af5d2a5d94493ddd027e8688131e3abee66d05d8b15c8b1f497bc5743f75224bfad829164fbcd86022920000000008000000000000000000", 0x2e4, r8) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 19:54:55 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x80) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') [ 433.703390] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 433.732782] SELinux: failed to load policy 19:54:56 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6#\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x342, 0x0) syncfs(0xffffffffffffffff) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$P9_RREADDIR(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2a00000029020000000000000000a6b8a900005adbd081ed52446c384966043a41bf00020000000000"], 0x29) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) r4 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r4, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) accept4(r7, &(0x7f0000000440)=@hci, &(0x7f00000004c0)=0x80, 0x80000) socket(0x11, 0x2, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'syz_tun\x00'}) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r9) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r9) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r12 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r12) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r12) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r12) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r15 = ioctl$LOOP_CTL_GET_FREE(r14, 0x4c82) ioctl$LOOP_CTL_REMOVE(r14, 0x4c81, r15) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r15) ioctl$LOOP_CTL_REMOVE(r13, 0x4c81, r15) r16 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r17 = ioctl$LOOP_CTL_GET_FREE(r16, 0x4c82) ioctl$LOOP_CTL_REMOVE(r16, 0x4c81, r17) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r17) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r17) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r9) syncfs(r7) 19:54:56 executing program 2: syz_open_pts(0xffffffffffffffff, 0x40) pipe(&(0x7f0000000140)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r